MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7cd7bf6e8ec89fecb6efbad8f40556bd1e2433b58864cec67c216bbd0bacee74. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Fabookie


Vendor detections: 15


Intelligence 15 IOCs YARA 9 File information Comments

SHA256 hash: 7cd7bf6e8ec89fecb6efbad8f40556bd1e2433b58864cec67c216bbd0bacee74
SHA3-384 hash: 3c423c8c1ca528663675fd1c2ccd9f31646c50b4a2b51f2b980db80f8946e2775a77246c95fffc4698c2b14fdf217176
SHA1 hash: 1cd6d8a903945d1b21ff4261c3c50370fc4acca1
MD5 hash: 9a4c1ffa5524000e27d735a01b5c7046
humanhash: freddie-carolina-hamper-queen
File name:file
Download: download sample
Signature Fabookie
File size:279'920 bytes
First seen:2023-10-05 08:31:23 UTC
Last seen:2023-10-06 00:47:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 6144:T4UpOobfAtnh2LnXHkWNsJxlSKz0oWV8zrlSenTExmKV7qF:8UQDtnhoUashS20hizrlS2ExWF
TLSH T14254CD53DEB54109E8ED16784AA4B2E35E321CB33112D622EDA8F07D7C3C2E749F15A2
TrID 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.0% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.2% (.EXE) Win32 Executable (generic) (4505/5/1)
1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Reporter andretavare5
Tags:exe Fabookie signed

Code Signing Certificate

Organisation:Installrox inc
Issuer:Installrox inc
Algorithm:sha256WithRSAEncryption
Valid from:2023-10-05T07:54:17Z
Valid to:2024-10-05T07:54:17Z
Serial number: 6de2df5965a2200e5fad3643de90f839
Thumbprint Algorithm:SHA256
Thumbprint: b93c0c7e2343a6e745ce0a36feec9adbfead54ae0dc11eae9e8f740ae114c811
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
andretavare5
Sample downloaded from http://185.225.74.144/files/Umm2.exe

Intelligence


File Origin
# of uploads :
20
# of downloads :
265
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
https://sunbabsco.com/wp-download/software/zip.7z
Verdict:
Malicious activity
Analysis date:
2023-10-05 15:29:52 UTC
Tags:
privateloader evasion opendir loader risepro stealer redline gcleaner ransomware stop stealc hijackloader tofsee botnet arkei vidar trojan amadey rat asyncrat remote raccoon recordbreaker danabot raccoonclipper danabot-unpacked g0njxa

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Creating a process with a hidden window
Launching a process
Creating a file
DNS request
Connecting to a non-recommended domain
Sending an HTTP GET request
Creating a process from a recently created file
Launching cmd.exe command interpreter
Running batch commands
Blocking the User Account Control
Query of malicious DNS domain
Sending a TCP request to an infection source
Adding exclusions to Windows Defender
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Fabookie, onlyLogger
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains process injector
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables UAC (registry)
Drops script or batch files to the startup folder
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sample uses string decryption to hide its real strings
Sigma detected: Drops script at startup location
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Fabookie
Yara detected Generic Downloader
Yara detected onlyLogger
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1320008 Sample: file.exe Startdate: 05/10/2023 Architecture: WINDOWS Score: 100 162 Multi AV Scanner detection for domain / URL 2->162 164 Found malware configuration 2->164 166 Malicious sample detected (through community Yara rule) 2->166 168 18 other signatures 2->168 11 file.exe 2 4 2->11         started        14 powershell.exe 2->14         started        16 DigitalPulseUpdate.exe 2->16         started        19 nhdues.exe 2->19         started        process3 dnsIp4 190 Writes to foreign memory regions 11->190 192 Allocates memory in foreign processes 11->192 194 Adds a directory exclusion to Windows Defender 11->194 196 2 other signatures 11->196 21 aspnet_regbrowsers.exe 15 107 11->21         started        26 powershell.exe 22 11->26         started        28 AppLaunch.exe 11->28         started        30 Microsoft.Workflow.Compiler.exe 11->30         started        32 conhost.exe 14->32         started        136 3.98.215.151 AMAZON-02US United States 16->136 138 35.182.67.195 AMAZON-02US United States 16->138 signatures5 process6 dnsIp7 140 85.217.144.143 WS171-ASRU Bulgaria 21->140 142 5.42.64.10 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 21->142 144 22 other IPs or domains 21->144 128 C:\Users\...\z8bjzFtw9sYJRgLOVZ0sRXeI.exe, PE32 21->128 dropped 130 C:\Users\...\yqv3BWmKG4qvuTAgIyG6c84g.exe, PE32+ 21->130 dropped 132 C:\Users\...\xCn8D88qB6i8wgPxfefUJZLa.exe, PE32 21->132 dropped 134 90 other malicious files 21->134 dropped 182 Drops script or batch files to the startup folder 21->182 184 Creates HTML files with .exe extension (expired dropper behavior) 21->184 34 6nSFYUtXHUlJ4KMIswqOTkTn.exe 3 21->34         started        38 IhK8bMviKLAWT4cNfptUT7Lg.exe 21->38         started        40 uIdNmlkk89F2Zrr9jwpu5FFK.exe 21->40         started        44 6 other processes 21->44 42 conhost.exe 26->42         started        file8 signatures9 process10 dnsIp11 114 C:\Users\user\AppData\Local\...\nhdues.exe, PE32 34->114 dropped 170 Contains functionality to inject code into remote processes 34->170 47 nhdues.exe 34->47         started        116 C:\Users\...\IhK8bMviKLAWT4cNfptUT7Lg.tmp, PE32 38->116 dropped 52 IhK8bMviKLAWT4cNfptUT7Lg.tmp 38->52         started        118 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 40->118 dropped 120 C:\Windows\System32\drivers\etc\hosts, ASCII 40->120 dropped 172 Modifies the hosts file 40->172 174 Adds a directory exclusion to Windows Defender 40->174 148 154.221.26.108 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 44->148 150 156.236.72.121 HKKFGL-AS-APHKKwaifongGroupLimitedHK Seychelles 44->150 122 C:\Users\...\FCDNeFRY1MNummpesESfG2Lr.tmp, PE32 44->122 dropped 124 C:\Users\user\AppData\Local\...\s51[1], PE32 44->124 dropped 126 C:\Users\...\67fc091e3b3d96b42126c4a847926817, SQLite 44->126 dropped 176 Detected unpacking (changes PE section rights) 44->176 178 Detected unpacking (overwrites its own PE header) 44->178 180 Tries to harvest and steal browser information (history, passwords, etc) 44->180 54 FCDNeFRY1MNummpesESfG2Lr.tmp 44->54         started        file12 signatures13 process14 dnsIp15 154 193.42.32.29 EENET-ASEE Germany 47->154 96 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 47->96 dropped 98 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 47->98 dropped 100 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 47->100 dropped 102 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 47->102 dropped 156 Multi AV Scanner detection for dropped file 47->156 158 Creates an undocumented autostart registry key 47->158 160 Uses schtasks.exe or at.exe to add and modify task schedules 47->160 56 rundll32.exe 47->56         started        59 cmd.exe 47->59         started        61 schtasks.exe 47->61         started        63 rundll32.exe 47->63         started        104 C:\Users\user\AppData\...\unins000.exe (copy), PE32 52->104 dropped 106 C:\Users\user\AppData\...\is-ORSOC.tmp, PE32 52->106 dropped 108 C:\Users\user\AppData\...\is-7H000.tmp, PE32+ 52->108 dropped 112 4 other files (3 malicious) 52->112 dropped 65 _setup64.tmp 52->65         started        67 schtasks.exe 52->67         started        69 schtasks.exe 52->69         started        71 DigitalPulseService.exe 52->71         started        110 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 54->110 dropped file16 signatures17 process18 dnsIp19 186 Contains functionality to modify clipboard data 56->186 74 rundll32.exe 56->74         started        77 conhost.exe 59->77         started        79 cmd.exe 59->79         started        81 cacls.exe 59->81         started        91 4 other processes 59->91 83 conhost.exe 61->83         started        85 conhost.exe 65->85         started        87 conhost.exe 67->87         started        89 conhost.exe 69->89         started        146 3.98.219.138 AMAZON-02US United States 71->146 signatures20 process21 signatures22 188 Tries to harvest and steal browser information (history, passwords, etc) 74->188 93 WerFault.exe 74->93         started        process23 dnsIp24 152 20.42.65.92 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 93->152
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-10-05 08:32:06 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
fabookie
Score:
  10/10
Tags:
family:amadey family:fabookie evasion spyware stealer trojan upx
Behaviour
Creates scheduled task(s)
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Launches sc.exe
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
.NET Reactor proctector
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Stops running service(s)
Amadey
Detect Fabookie payload
Fabookie
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
http://193.42.32.29/9bDc8sQ/index.php
http://app.nnnaajjjgc.com/check/safe
Unpacked files
SH256 hash:
2d52ea9eb71daae07d5222940dac3bbd5e6e44c5e3c4eb36c84c96567f418bc4
MD5 hash:
9a91bb8ff2128ab120928ac3dec504a1
SHA1 hash:
373096287564c9d5c083c2f32cbfdd581bf197d3
SH256 hash:
7cd7bf6e8ec89fecb6efbad8f40556bd1e2433b58864cec67c216bbd0bacee74
MD5 hash:
9a4c1ffa5524000e27d735a01b5c7046
SHA1 hash:
1cd6d8a903945d1b21ff4261c3c50370fc4acca1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:MSIL_TinyDownloader_Generic
Author:albertzsigovits
Description:Detects small-sized dotNET downloaders
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments