General
-
Target
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5.bin.gz
-
Size
19.1MB
-
Sample
241208-31m82s1lhn
-
MD5
8ebac20b51430b0cc35cef0bb4343524
-
SHA1
d73890138f1bac7f87cbb0137a86b000ca1dfdc8
-
SHA256
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5
-
SHA512
0db3f4eb3df46f9811793edd29388fe7c9a36c3c9f94f4f16caaaa70d0a28aa4e8a38ccc96fd57270dab9d23b0313f85aab0808e81c660512bc8abc7d2f90674
-
SSDEEP
393216:obnSY7czVZQ+jQ3o3xrcJpuEJsVLDV3EJCP2qzFMlSQbY3hyt:GOVSiQ30xrUQkoFz+qaghyt
Static task
static1
Behavioral task
behavioral1
Sample
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5.bin.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5.bin.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5.bin.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5.bin.gz
-
Size
19.1MB
-
MD5
8ebac20b51430b0cc35cef0bb4343524
-
SHA1
d73890138f1bac7f87cbb0137a86b000ca1dfdc8
-
SHA256
0017a2f18f49ca0a4cc0a1f6a524faa5658ae033eda508906b626329c232fba5
-
SHA512
0db3f4eb3df46f9811793edd29388fe7c9a36c3c9f94f4f16caaaa70d0a28aa4e8a38ccc96fd57270dab9d23b0313f85aab0808e81c660512bc8abc7d2f90674
-
SSDEEP
393216:obnSY7czVZQ+jQ3o3xrcJpuEJsVLDV3EJCP2qzFMlSQbY3hyt:GOVSiQ30xrUQkoFz+qaghyt
-
Detect Fabookie payload
-
Fabookie family
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1