General

  • Target

    1520-655-0x00000000036D0000-0x0000000003801000-memory.dmp

  • Size

    1.2MB

  • MD5

    5fad930738b02b799a9494464bee28da

  • SHA1

    18fd3c31786e271f43484d8a1dfe43b0e9979c96

  • SHA256

    9405f61dcb1181e1f30d502ab4a6f1a4c5258b79e247b7f1a756f9b65beca7a9

  • SHA512

    9bd03558289653205bd377317c689654bbdcb392de6117a4c9dadd3bf9e80aa8e759dc1dfd0721f1101728bd3699f75b893f53d968cf3bc358ea9422bf90d349

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAA1ftxmbfYQJZKMY4:7I99DEWVtQAAZmn0p

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1520-655-0x00000000036D0000-0x0000000003801000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections