Analysis

  • max time kernel
    89s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2024 05:09

General

  • Target

    a6d05b0664378a130d90943b169986c3.exe

  • Size

    715KB

  • MD5

    a6d05b0664378a130d90943b169986c3

  • SHA1

    34f5e5102ae59d14bcd3c18e13607edc2d0d42f7

  • SHA256

    48513a320dace9218b3612cb8496518620a07c9dc62f0e6d19f0e2639c6bc9f9

  • SHA512

    858667f11bcd7dcc4ded28657b68fc602b4cfee0d4c0490b6c3a80d503339b8c478f2a90db4a0a6c909f0d8ead5c6a1cb36f1d9a6a867233a54b773c00ba0f4b

  • SSDEEP

    6144:nA01Nd5uvxQWQSYYaE5CinBdRxQ7cUBmCUiJbc77ZvfuYuEdGxTC2gWf7xLUnw+V:ndo5QWJnnBIShtdGxTC2Q5JL

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6d05b0664378a130d90943b169986c3.exe
    "C:\Users\Admin\AppData\Local\Temp\a6d05b0664378a130d90943b169986c3.exe"
    1⤵
      PID:4704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4704-0-0x00007FF783210000-0x00007FF7832C7000-memory.dmp

      Filesize

      732KB

    • memory/4704-11-0x0000000002A50000-0x0000000002B5A000-memory.dmp

      Filesize

      1.0MB

    • memory/4704-12-0x0000000002C90000-0x0000000002DBC000-memory.dmp

      Filesize

      1.2MB

    • memory/4704-15-0x0000000002C90000-0x0000000002DBC000-memory.dmp

      Filesize

      1.2MB