General

  • Target

    1068-382-0x0000000003730000-0x0000000003861000-memory.dmp

  • Size

    1.2MB

  • MD5

    ec9ca41d045ce92ae279be7f408a6bbe

  • SHA1

    3c9dd73e0c7001c3f6f25b306b81c06db9843e7e

  • SHA256

    9da06cec33ded7da87a8ceef13ae5e219414e243689b5dd28c6eb69d285a8ca6

  • SHA512

    0d24da3c2a613ac2ea7cc53ff60a93be813a0b3d10a976bd700e4901d5c46189f6012119dffb41a7817fdd4a9a6950078ead5cfc3e30cee6e820ab12799fa82b

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAi1ftxmbfYQJZKEeX:7I99DEWVtQAiZmn0f

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1068-382-0x0000000003730000-0x0000000003861000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections