General

  • Target

    844-375-0x00000000035D0000-0x0000000003701000-memory.dmp

  • Size

    1.2MB

  • MD5

    7b240e4ab86e0745e5ef263bdb658db6

  • SHA1

    d9d72287ab848860fd02d529f9c890d5e04809c9

  • SHA256

    e8a70b2d439de8ac6b6d2e561768970be61614679185b56804a480d9d4864827

  • SHA512

    bf0d3d7e03eaba06b968fc1c375715588cea0f40f12989cccac1e093ceecf4270ae2a241feb9622ee765fb8d7e28540b7b40c4fc25cf472b024d383e2abe188c

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAw1ftxmbfYQJZK6Ibq:7I99DEWVtQAwZmn0Tb

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 844-375-0x00000000035D0000-0x0000000003701000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections