General

  • Target

    1604-523-0x00000000034D0000-0x0000000003601000-memory.dmp

  • Size

    1.2MB

  • MD5

    0f61ec33695252b10b3242ea7e7ce1fe

  • SHA1

    3a4a8a1622bcb9618c37f9af5cfff256cc3dc44b

  • SHA256

    d085aa35ad0a6676c2c6621fd7be33c244499aaee04a26aa1ec11890dcaca3d8

  • SHA512

    2c9893bed91cd9e0aca5f63271bc907f8bfdd4cca4313bc4a326dcb087999336f8f6b4df3f87cc1954352751de3821a57940ea63ae910e737f956588c25de117

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAg1ftxmbfYQJZKq4W:7I99DEWVtQAgZmn0T

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1604-523-0x00000000034D0000-0x0000000003601000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections