General

  • Target

    2004-738-0x00000000033D0000-0x0000000003501000-memory.dmp

  • Size

    1.2MB

  • MD5

    77a61978e170f4701a6f2ba6ec771d87

  • SHA1

    2c82df8ae26b2d1873d6678b501aa21c03a1d74b

  • SHA256

    7753a5b649b0b09bd83e56291978bd7abe6f10c1ca962786f083dbdef714432e

  • SHA512

    ecdbf5758fda6702e828e8ff37f6366f654f6f72c02e66c475392fe00f04a3c775c4a054f7472ea9ff8784fa3cd5592a2519c68d7121fe41af58aea70a1bdc83

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAQ1ftxmbfYQJZKqo1:7I99DEWVtQAQZmn0j

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-738-0x00000000033D0000-0x0000000003501000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections