Behavioral task
behavioral1
Sample
1360-339-0x0000000003560000-0x0000000003691000-memory.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1360-339-0x0000000003560000-0x0000000003691000-memory.dll
Resource
win10v2004-20230915-en
General
-
Target
1360-339-0x0000000003560000-0x0000000003691000-memory.dmp
-
Size
1.2MB
-
MD5
d306c728a20b334f1261a4825b2cd313
-
SHA1
51383a197784b93a301720c4796762e7620c636b
-
SHA256
e1f11f71c07e731a62c9c5b88ecba28bf6f0d3d00353a66b21ca06ccd39b3a4c
-
SHA512
2c03f2ddf0289c7ef5e14bd0abeefe2e1227898ee8b4bba064d0e5a5a4ebcbd575c56e8ce607d9f0e75ca8e66f5597e5b55c554075292e7d7eae096ed25e6a96
-
SSDEEP
24576:3C7CI9TZDEWk1wCy0zaG9cQAR1ftxmbfYQJZKDJV:7I99DEWVtQARZmn0F
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule sample family_fabookie -
Fabookie family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1360-339-0x0000000003560000-0x0000000003691000-memory.dmp
Files
-
1360-339-0x0000000003560000-0x0000000003691000-memory.dmp.dll windows:6 windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.text Size: 906KB - Virtual size: 905KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ