General

  • Target

    4648-406-0x00000000035E0000-0x0000000003711000-memory.dmp

  • Size

    1.2MB

  • MD5

    7e0acdbe2c2c339809389e8bfd3eb78f

  • SHA1

    69c822be89ba12e25773900b02232a5fdac2be63

  • SHA256

    834e0c4cbfa514c04b647e50d46ee0435334ba40be1c04088f0ad81a1df8e08a

  • SHA512

    a189e24e61f747fa1d36568a4885d060a906864bb3d0163fa42607b9cb858f1e6bbd50494deb1cba900b6b8f8af8388a9b4d8d765aa5b1fd96d3398024de6a77

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAZ1ftxmbfYQJZKPBsN:7I99DEWVtQAZZmn05

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4648-406-0x00000000035E0000-0x0000000003711000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections