General

  • Target

    2040-397-0x00000000035C0000-0x00000000036F1000-memory.dmp

  • Size

    1.2MB

  • MD5

    da6ffce44f7589d57d7076a90da5a574

  • SHA1

    23e50dfedba844c8ff4b74e24d66e1d76248ac17

  • SHA256

    28ba34a7f07e2cc20797d02ab54a28a5ef42fc68fd6b041a14b1b565ac964e2d

  • SHA512

    a665d1056451560ab9a8ab6613cdf1b86729fee8784decaf157afc8922b4dd80adff0f8feef112f5f63627a4bbe65b95938ba4020fa0bbd0e980962f1f39d159

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAr1ftxmbfYQJZKfn7:7I99DEWVtQArZmn0/

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-397-0x00000000035C0000-0x00000000036F1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections