General

  • Target

    3920-346-0x0000000002B40000-0x0000000002C71000-memory.dmp

  • Size

    1.2MB

  • MD5

    f64452843ca5cabc11b78dbf16fbb60d

  • SHA1

    8e219783f12c3410ee6d40d2760c5ad0aa910f18

  • SHA256

    aff295be1a86f179c1a72af6c1e336dc0441d0572c336b224dc92726bba2baad

  • SHA512

    c73dc88fde14a269d9e3a005677d8511c0d9d2e56bf57fa07e07727b132e34735d9a75a7ab0171372bcd04e297e986eed73ae9412841af1a86d93fbdba9648a6

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAG1ftxmbfYQJZKQIe:7I99DEWVtQAGZmn0Z

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3920-346-0x0000000002B40000-0x0000000002C71000-memory.dmp
    .dll windows x64


    Headers

    Sections