General

  • Target

    836-374-0x0000000003750000-0x0000000003881000-memory.dmp

  • Size

    1.2MB

  • MD5

    e5e837cede439199632fe6b9aa6860bf

  • SHA1

    8f64ef884b895e7f75a0b62fa1bf237e521b0468

  • SHA256

    6a5023a4ac838cb2dd47e7059e11d15a6f3d5d2dc01fe466f6be5148f668caa4

  • SHA512

    59d7e26b77d3024852abb3f40cb4550fa0e5377ddc083f58d391280529e0043098a0f3a20d6192b4bc3adfe3eab0ae45c535ff9f245ae4a682639a1872b7990d

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAI1ftxmbfYQJZKuAe:7I99DEWVtQAIZmn0v

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 836-374-0x0000000003750000-0x0000000003881000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections