General

  • Target

    1272-1033-0x00000000031D0000-0x0000000003301000-memory.dmp

  • Size

    1.2MB

  • MD5

    b4ef86f21e0876513f1c3c0c398d30db

  • SHA1

    ad77c238153345ebbbde73d21c1ab0d1adec847a

  • SHA256

    09fac0013656ab50890ef189ccf691cc1a29da5d7db5ec55a138920143ae929d

  • SHA512

    49c2cde5f0841dbdc085cf647caa5a377dcd34f46478373382e9c23075b946fede443684cb009ce212adce3f3a3141eddf20d6c0b6996ec545a9631846dff03c

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAw1ftxmbfYQJZKEInG:7I99DEWVtQAwZmn0R

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1272-1033-0x00000000031D0000-0x0000000003301000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections