General

  • Target

    744-364-0x0000000003720000-0x0000000003851000-memory.dmp

  • Size

    1.2MB

  • MD5

    4e4a074dd48a14894b4dbfa53e44491d

  • SHA1

    ed21c6c3a74b381bd06d745f20220876457c386d

  • SHA256

    0313b34eb3e66126116fd7e9370b73f57da1daf823f7f171edc76367db1b8292

  • SHA512

    8e71227056617fbae8191cae0cec2eefdf627ee97c043728d3a7ccc17bdbfad1a329fea834e3d600c743c2da7f072e67762dbf581e47d61737e42fcb2ecaad12

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA91ftxmbfYQJZKmVB:7I99DEWVtQA9Zmn0i

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 744-364-0x0000000003720000-0x0000000003851000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections