General

  • Target

    4056-403-0x0000000002ED0000-0x0000000003001000-memory.dmp

  • Size

    1.2MB

  • MD5

    582dd05d9e59b04df3d560564e8b43f2

  • SHA1

    4fce94ad3c3de84d7b187b910cb927341c89e939

  • SHA256

    e77235aa49e949cb4ed2132d199ab5ce440335f8a9f9e56ecc8ef50e70ce8f77

  • SHA512

    b65f4ffcf4e01e0a0737dd00bec607e8ebc8a2b8c8998d6f3e494ebeb9cb07d7319abcdf953dd8a2634b67c4bdfd2cbb48b0744d4cf17024ac3b97b03fb85c9a

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA91ftxmbfYQJZKJDS:7I99DEWVtQA9Zmn0Z

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4056-403-0x0000000002ED0000-0x0000000003001000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections