General

  • Target

    1432-799-0x0000000003450000-0x0000000003581000-memory.dmp

  • Size

    1.2MB

  • MD5

    6aac44c012c13406197f487bb4db93aa

  • SHA1

    69d015031dc226a93e663e07e239be5784291ae8

  • SHA256

    3e914bf06c91fc767fc595e60da432318fd7f4d74a594aab94b1943016639d15

  • SHA512

    a90cdeeecdadc1ee7548c3c47fe5df6c56a51ca9aecb03289db7f6c1c3debd72329db6d941f1c09130a265c08037211c9a54b019d43803bfd3bcb31372ef110d

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAY1ftxmbfYQJZK/QaU:7I99DEWVtQAYZmn04

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1432-799-0x0000000003450000-0x0000000003581000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections