General

  • Target

    1688-712-0x0000000003650000-0x0000000003781000-memory.dmp

  • Size

    1.2MB

  • MD5

    618822c31ee1249626c39457b418f2b0

  • SHA1

    bf7e32b48169f692b67032c6329fd0852c27d35d

  • SHA256

    1c599e4d8f741f6565bec43c7e1cfde694ab89263e5bd221af5659a924c3182a

  • SHA512

    37bc4d11c953a0a9ccde7de0f2ce48bc7d4734b3436814efac034f9804590b21df86c36c5ce9b59423e436812c1834d64b2c6336598729786e12642eadcf4d87

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA41ftxmbfYQJZKXwM:7I99DEWVtQA4Zmn0g

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-712-0x0000000003650000-0x0000000003781000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections