General

  • Target

    964-362-0x00000000032A0000-0x00000000033D1000-memory.dmp

  • Size

    1.2MB

  • MD5

    181ad6c3f37b1f399682e89b33b07fa9

  • SHA1

    fd8f53197af694e7da36b7a2462a33cd18d18642

  • SHA256

    9c2dfff09d34babbc331263b2cd83974c09581d1714d07363bbb18be15c819cf

  • SHA512

    2a6124a110bdd45e8fde46305f92651da46cdb76d3d61d701db17db0dad66b02470f8477d41f5d543a2535e05675807dbcf3793e903e462be1f7efe14175c244

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAV1ftxmbfYQJZKX9J:7I99DEWVtQAVZmn0t

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 964-362-0x00000000032A0000-0x00000000033D1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections