General

  • Target

    4136-367-0x0000000002DE0000-0x0000000002F11000-memory.dmp

  • Size

    1.2MB

  • MD5

    cdeda3af14ee1f61471bcebe742bab6e

  • SHA1

    65187f162e0dc80bff44020a3842c501f527bfc3

  • SHA256

    08ca57936646c48d58933558a50c1c1fc320610265089251cc7611c333c36fae

  • SHA512

    f633242b7e8b389408cfa7b3a7be3cae22f54a548f484f12e312f6dd043d9cd39f79ba0e7f7c35cd977747c7221159296a39f249a44b55053cfa4b2533be97bc

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAs1ftxmbfYQJZKGyt:7I99DEWVtQAsZmn0l

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4136-367-0x0000000002DE0000-0x0000000002F11000-memory.dmp
    .dll windows x64


    Headers

    Sections