General

  • Target

    1248-377-0x00000000032B0000-0x00000000033E1000-memory.dmp

  • Size

    1.2MB

  • MD5

    66c2c5ab3a3736e7142d016e5d3efd75

  • SHA1

    baabdac0ba926e727cf3004dfb602951372701de

  • SHA256

    89d2d7b606fc65f4b13f5e921afa795295a6fdc57b43c0b8096cbd891c4e9c48

  • SHA512

    1ad11881ca1983f90c4e14ae29219016acccda85c98a94be11472658e0e2b3e867c60111250fe41295dec5e40f7add5320c8ac2dc91ca40f1384da1af159e43e

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA61ftxmbfYQJZK82t:7I99DEWVtQA6Zmn0v

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1248-377-0x00000000032B0000-0x00000000033E1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections