General

  • Target

    1620-662-0x0000000003710000-0x0000000003841000-memory.dmp

  • Size

    1.2MB

  • MD5

    050a3126205b8fdf9e2b0b0dfc6bb168

  • SHA1

    75a4ab93ab8273c6df503c9d58ac3fae460c52c6

  • SHA256

    bd6e9ca1b65746f379cd230ee924fc601edb628f44e21180cd56c5bdf1616c9b

  • SHA512

    2807991c782dabeda120a76f5f6b3c1e789f37a14976925ad3680151c3837317a34b55c00b8f853093d797e963a5dfe8cfdfb3f6453289efa71b7b71858e5f66

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAE1ftxmbfYQJZKfykp:7I99DEWVtQAEZmn0fH

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-662-0x0000000003710000-0x0000000003841000-memory.dmp
    .dll windows x64


    Headers

    Sections