General

  • Target

    4444-416-0x00000000031A0000-0x00000000032D1000-memory.dmp

  • Size

    1.2MB

  • MD5

    bd93fc0edff2f56090303c6c93e3d576

  • SHA1

    b64914954287c8715ed83d8e60effb6f820c62ec

  • SHA256

    ede0eefc0303a3ba7e89ce083fb405ab6fbbf8e07aa3198d797d053970008374

  • SHA512

    6873fffddd474f9610bcceeb538a069c21c967ef520e49f49975be2f5cd86758c284277490e080ff25600e921c86a0f4c87fbd6315dd6366fa74fb2a2c708ab2

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAF1ftxmbfYQJZKHtS:7I99DEWVtQAFZmn0N

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4444-416-0x00000000031A0000-0x00000000032D1000-memory.dmp
    .dll windows x64


    Headers

    Sections