MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d82f2c9c923a145c7d4608be1f9ba982ea4ff937b145634fe4f8c338211cdb0e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Fabookie


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: d82f2c9c923a145c7d4608be1f9ba982ea4ff937b145634fe4f8c338211cdb0e
SHA3-384 hash: 16e9be3f71575720022defd41d48f20cf3ca8314ffa4e0c99ae698a06bb62977a4ecb61051739756526b351e7c659071
SHA1 hash: a4ac2d7e45de6795aac322354278acc855489fce
MD5 hash: 0f1f4ce03d9bacf600abf05b4c1d6817
humanhash: oregon-carpet-princess-avocado
File name:file
Download: download sample
Signature Fabookie
File size:457'728 bytes
First seen:2023-03-08 13:35:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7bae02ef14998d8530ddf0278301170f (3 x Fabookie)
ssdeep 6144:C8aMyDtA083XIMxEZ/mRfhTp+e5t5kkUgRGerEhgVIXFML:C5GIuEZ/mce5ZaerLIX
Threatray 19 similar samples on MalwareBazaar
TLSH T1F6A41819FBB448E0C196C635CDBE827BE272BD830A15930B4255FF9E3FF351069A9681
TrID 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
26.1% (.EXE) Win64 Executable (generic) (10523/12/4)
12.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.1% (.ICL) Windows Icons Library (generic) (2059/9)
5.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 04dcd4c282e0f000 (37 x Fabookie)
Reporter jstrosch
Tags:exe Fabookie X64

Intelligence


File Origin
# of uploads :
1
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive greyware obfuscated shell32.dll upatre
Result
Threat name:
Fabookie
Detection:
malicious
Classification:
troj.spyw
Score:
84 / 100
Signature
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Fabookie
Behaviour
Behavior Graph:
Threat name:
Win64.Downloader.Minerva
Status:
Malicious
First seen:
2023-03-03 13:07:00 UTC
File Type:
PE+ (Exe)
Extracted files:
110
AV detection:
16 of 25 (64.00%)
Threat level:
  3/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
spyware stealer
Behaviour
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
d82f2c9c923a145c7d4608be1f9ba982ea4ff937b145634fe4f8c338211cdb0e
MD5 hash:
0f1f4ce03d9bacf600abf05b4c1d6817
SHA1 hash:
a4ac2d7e45de6795aac322354278acc855489fce
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Fabookie

Executable exe d82f2c9c923a145c7d4608be1f9ba982ea4ff937b145634fe4f8c338211cdb0e

(this sample)

  
Delivery method
Distributed via web download

Comments