MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48f42120cc5b3683db52663963704e8f0a7d935a2a24e3911e83079fb4f25ff3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Fabookie


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 48f42120cc5b3683db52663963704e8f0a7d935a2a24e3911e83079fb4f25ff3
SHA3-384 hash: 1f212046253a5f27bb50a56e385435f8f24a9b78a1e30ce21cfff6fd78e4cf1c2681fb9820a7f80396687a06e0a64d32
SHA1 hash: 712e154408f7c3c55b08120b1e729b8bedd29a34
MD5 hash: 427d7fa7985c51a913c88ac92a5df795
humanhash: november-alpha-seven-violet
File name:427d7fa7985c51a913c88ac92a5df795.exe
Download: download sample
Signature Fabookie
File size:625'152 bytes
First seen:2023-08-26 08:31:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a9c887a4f18a3fede2cc29ceea138ed3 (35 x CoinMiner, 17 x AsyncRAT, 17 x BlankGrabber)
ssdeep 12288:ERivuoAtJ0Ej5FH3I95Q++qz+oFDtOOafqFAwCCys6+fGvaNB7ZXy+j3jMJW:ERntJPb4fQFvSt6iPyT+fGv6Bd
Threatray 1'220 similar samples on MalwareBazaar
TLSH T19CD4BF13FB6591EDCAF13930B5494296BD96C9EC638808690D2BDB520BCE43F9397CB4
TrID 38.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
15.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
11.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.5% (.EXE) Win32 Executable (generic) (4505/5/1)
4.8% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter abuse_ch
Tags:exe Fabookie

Intelligence


File Origin
# of uploads :
1
# of downloads :
254
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
427d7fa7985c51a913c88ac92a5df795.exe
Verdict:
Malicious activity
Analysis date:
2023-08-26 08:41:55 UTC
Tags:
amadey trojan loader fabookie stealer kelihos smoke miner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Sending an HTTP GET request
Launching a process
Launching cmd.exe command interpreter
DNS request
Adding an access-denied ACE
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Fabookie, Glupteba, SmokeLoader,
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates files in the system32 config directory
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Drops PE files with benign system names
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the hosts file
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Tries to download and execute files (via powershell)
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Update Standalone Installer command line found (may be used to bypass UAC)
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Fabookie
Yara detected Glupteba
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1297761 Sample: 3mUbHMpWCa.exe Startdate: 26/08/2023 Architecture: WINDOWS Score: 100 174 Snort IDS alert for network traffic 2->174 176 Multi AV Scanner detection for domain / URL 2->176 178 Found malware configuration 2->178 180 17 other signatures 2->180 12 3mUbHMpWCa.exe 3 2->12         started        16 yiueea.exe 2->16         started        18 TrustedInstaller.exe 2->18         started        20 3 other processes 2->20 process3 dnsIp4 148 192.168.2.1 unknown unknown 12->148 126 C:\Users\user\AppData\...\latestplayer.exe, PE32 12->126 dropped 128 C:\Users\user\AppData\Local\Temp\aafg31.exe, PE32+ 12->128 dropped 22 latestplayer.exe 3 12->22         started        26 aafg31.exe 14 12->26         started        file5 process6 dnsIp7 118 C:\Users\user\AppData\Local\...\yiueea.exe, PE32 22->118 dropped 206 Antivirus detection for dropped file 22->206 208 Multi AV Scanner detection for dropped file 22->208 210 Machine Learning detection for dropped file 22->210 212 Contains functionality to inject code into remote processes 22->212 29 yiueea.exe 25 22->29         started        144 app.nnnaajjjgc.com 154.221.26.108, 49720, 80 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 26->144 146 z.nnnaajjjgc.com 156.236.72.121, 443, 49717 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 26->146 120 C:\Users\...\7b2e7c93da45bb7cea897350bac78533, SQLite 26->120 dropped 214 Detected unpacking (creates a PE file in dynamic memory) 26->214 216 Windows Update Standalone Installer command line found (may be used to bypass UAC) 26->216 218 Contains functionality to steal Chrome passwords or cookies 26->218 220 Tries to harvest and steal browser information (history, passwords, etc) 26->220 file8 signatures9 process10 dnsIp11 150 79.137.192.18, 49718, 49719, 49721 PSKSET-ASRU Russian Federation 29->150 152 www.skylitevisa.com 29->152 154 2 other IPs or domains 29->154 130 C:\Users\user\AppData\...\religionprosig.exe, PE32+ 29->130 dropped 132 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 29->132 dropped 134 C:\Users\user\AppData\Local\...\alotdata.exe, PE32 29->134 dropped 136 5 other malicious files 29->136 dropped 242 Antivirus detection for dropped file 29->242 244 Multi AV Scanner detection for dropped file 29->244 246 Creates an undocumented autostart registry key 29->246 248 2 other signatures 29->248 34 helptool.exe 29->34         started        37 alotdata.exe 29->37         started        39 religionprosig.exe 29->39         started        41 3 other processes 29->41 file12 signatures13 process14 file15 182 Antivirus detection for dropped file 34->182 184 Multi AV Scanner detection for dropped file 34->184 186 Detected unpacking (changes PE section rights) 34->186 188 Injects a PE file into a foreign processes 34->188 44 helptool.exe 34->44         started        190 Detected unpacking (overwrites its own PE header) 37->190 192 Machine Learning detection for dropped file 37->192 194 Modifies the windows firewall 37->194 196 Drops PE files with benign system names 37->196 47 alotdata.exe 37->47         started        50 powershell.exe 37->50         started        198 Creates multiple autostart registry keys 39->198 52 cmd.exe 39->52         started        122 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 41->122 dropped 124 C:\Windows\System32\drivers\etc\hosts, ASCII 41->124 dropped 200 Suspicious powershell command line found 41->200 202 Modifies the hosts file 41->202 204 Adds a directory exclusion to Windows Defender 41->204 54 conhost.exe 41->54         started        56 conhost.exe 41->56         started        58 cmd.exe 1 41->58         started        60 5 other processes 41->60 signatures16 process17 file18 222 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 44->222 224 Maps a DLL or memory area into another process 44->224 226 Checks if the current machine is a virtual machine (disk enumeration) 44->226 228 Creates a thread in another existing process (thread injection) 44->228 62 explorer.exe 44->62 injected 138 C:\Windows\rss\csrss.exe, PE32 47->138 dropped 230 Creates multiple autostart registry keys 47->230 232 Creates an autostart registry key pointing to binary in C:\Windows 47->232 67 cmd.exe 47->67         started        69 powershell.exe 47->69         started        71 powershell.exe 47->71         started        73 powershell.exe 47->73         started        75 conhost.exe 50->75         started        234 Suspicious powershell command line found 52->234 236 Tries to download and execute files (via powershell) 52->236 238 Uses powercfg.exe to modify the power settings 52->238 240 2 other signatures 52->240 77 powershell.exe 52->77         started        79 conhost.exe 52->79         started        signatures19 process20 dnsIp21 156 host-host-file8.com 194.169.175.250 CLOUDCOMPUTINGDE Germany 62->156 158 host-file-host6.com 62->158 140 C:\Users\user\AppData\Roaming\bftubia, PE32 62->140 dropped 162 System process connects to network (likely due to code injection or exploit) 62->162 164 Benign windows process drops PE files 62->164 166 Suspicious powershell command line found 62->166 168 2 other signatures 62->168 81 cmd.exe 62->81         started        84 cmd.exe 62->84         started        86 powershell.exe 62->86         started        98 2 other processes 62->98 88 netsh.exe 67->88         started        90 conhost.exe 67->90         started        92 conhost.exe 69->92         started        94 conhost.exe 71->94         started        96 conhost.exe 73->96         started        160 ledentiste.ma 41.77.116.197 GTCOMMCA Morocco 77->160 142 C:\ProgramData\religiousplanpro.zip, Zip 77->142 dropped file22 signatures23 process24 signatures25 170 Modifies power options to not sleep / hibernate 81->170 100 conhost.exe 81->100         started        102 powercfg.exe 81->102         started        114 3 other processes 81->114 104 conhost.exe 84->104         started        106 sc.exe 84->106         started        108 sc.exe 84->108         started        116 3 other processes 84->116 110 conhost.exe 86->110         started        172 Creates files in the system32 config directory 88->172 112 conhost.exe 98->112         started        process26
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2023-08-25 22:02:14 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:fabookie family:glupteba family:smokeloader family:xmrig botnet:up3 backdoor dropper evasion loader miner persistence rootkit spyware stealer trojan upx
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Manipulates WinMon driver.
Manipulates WinMonFS driver.
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Stops running service(s)
Modifies boot configuration data using bcdedit
XMRig Miner payload
Amadey
Detect Fabookie payload
Fabookie
Glupteba
Glupteba payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Windows security bypass
xmrig
Malware Config
C2 Extraction:
79.137.192.18/9bDc8sQ/index.php
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
48f42120cc5b3683db52663963704e8f0a7d935a2a24e3911e83079fb4f25ff3
MD5 hash:
427d7fa7985c51a913c88ac92a5df795
SHA1 hash:
712e154408f7c3c55b08120b1e729b8bedd29a34
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Fabookie

Executable exe 48f42120cc5b3683db52663963704e8f0a7d935a2a24e3911e83079fb4f25ff3

(this sample)

  
Delivery method
Distributed via web download

Comments