General

  • Target

    1320-686-0x00000000032E0000-0x0000000003411000-memory.dmp

  • Size

    1.2MB

  • MD5

    9979c5f8dbb8b4a53305c70c7f41fe14

  • SHA1

    afc9fa163770ab19d73b940acf670ddde003d4cc

  • SHA256

    0f77c2582ad5eb99532bbaf410d953b924657fb873e9351398b03fdccaf0e42f

  • SHA512

    32dd3c490ab3d2e5def6df8cd49052f08e5945d2e2d7ac3da1597b952fce949e0d9de76a28b8216bc6a989fbb477b1360ff5b673878a87fce357c412830fa395

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAp1ftxmbfYQJZKqxD:7I99DEWVtQApZmn0K

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1320-686-0x00000000032E0000-0x0000000003411000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections