General

  • Target

    2080-382-0x0000000002650000-0x0000000002781000-memory.dmp

  • Size

    1.2MB

  • MD5

    c1008b654537c54d58dd173c6359ce60

  • SHA1

    b634a5f2ebc4dbd94a5de24c9b8c2fa0e2590eda

  • SHA256

    d252897c226bb84c22eba517850b307526c283a77be0c10601b5c6baa8d905b5

  • SHA512

    7434064be4aa1513f8a565fa05c23b153f22c73dce226fdd924817f87ba4fc43a7113feeff0681bee441e98b3d58ae798a494d8abc05e5dbc7c4c76e10fdb920

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA11ftxmbfYQJZKPbK:7I99DEWVtQA1Zmn0T

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-382-0x0000000002650000-0x0000000002781000-memory.dmp
    .dll windows x64


    Headers

    Sections