General

  • Target

    2812-444-0x0000000003600000-0x0000000003731000-memory.dmp

  • Size

    1.2MB

  • MD5

    ec33ee529568a3981dcd9249442dd012

  • SHA1

    b59aff01afefeabe5b228ca179bd091f94e57396

  • SHA256

    c2d0fa423102607b7d5de8e00702d7db2774889ff4cbe8457cd17933e112b241

  • SHA512

    38483e2df43b54458915bd0b9bfaed408f6b736956e3dd5816bc9c7105b4bdf73126b49a3bd7cd78e8b626d673d4f07b619456eb71a016ea8e0fd4d03f3ea08a

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA/1ftxmbfYQJZKBr/:7I99DEWVtQA/Zmn0N

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2812-444-0x0000000003600000-0x0000000003731000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections