General

  • Target

    4068-372-0x0000000002CE0000-0x0000000002E11000-memory.dmp

  • Size

    1.2MB

  • MD5

    18d8335981ea1cbc7b9a595fb31d1252

  • SHA1

    6b5308ba4dd0d522af683aa9334750a29be14ab7

  • SHA256

    e215a97e2bcd9e222cbf2a418cfa8827a1686b84979b4bd700714b87ab9721a3

  • SHA512

    e6e0219eb60960444e4415e39426a0223508265a20551dc1b4b93d8f3535cc29996561b8395b4cd3f9d72a0ec921c81f9b6dc9476ba93fa1b95f96fb2eb81f53

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAc1ftxmbfYQJZK3JQdO:7I99DEWVtQAcZmn0ZQ

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4068-372-0x0000000002CE0000-0x0000000002E11000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections