General

  • Target

    1660-385-0x00000000035F0000-0x0000000003721000-memory.dmp

  • Size

    1.2MB

  • MD5

    933446824510437bbac51dd3aebddc65

  • SHA1

    f2ff658a4d7a520c9a4e83413017a06760fa79d0

  • SHA256

    3a6cfdab6506ffe467cb48b73639cd67c2a5ff2f712289fc6c0e58625ad79341

  • SHA512

    a88eb12405d6e4a7a32259cc2ec3ac51d3f7f01e5143eb7dbc418acc0b998d0b305643f4b43801f96a52937dfb14698336b5d04deca5e4f36d83fa4da2ceaebe

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAe1ftxmbfYQJZKMISB:7I99DEWVtQAeZmn0M3

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1660-385-0x00000000035F0000-0x0000000003721000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections