General

  • Target

    5168-675-0x00000000033C0000-0x00000000034F1000-memory.dmp

  • Size

    1.2MB

  • MD5

    a2f9b27dbe76a8ade896c2375346da1f

  • SHA1

    80c33deacf5f9b9661dca56b1bbd0da9aa609ca8

  • SHA256

    f7766d0466426ba50ccaeb079da756097b04662cd1e6610ddd093159db537732

  • SHA512

    1f55d7b199bb3e18272860e54ad2a7926308f65bc46f5cb1dc14c4f7dbc9567021bf5fb77dfccc9d3bc022badf61bb0a7625170b63cb8ef00c08a4e82924c994

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAL1ftxmbfYQJZK/HA:7I99DEWVtQALZmn0/

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5168-675-0x00000000033C0000-0x00000000034F1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections