General

  • Target

    1028-989-0x00000000032E0000-0x0000000003411000-memory.dmp

  • Size

    1.2MB

  • MD5

    c4a391e63d2851f7e5d6bd571937c55f

  • SHA1

    8ce8d5b5ac4d0c8c5cce8d24961df5fba4f4f4af

  • SHA256

    89da844bd6ba30884a4abc1f2128fd0fbfb4b07723cedc3770417aacdeac4f08

  • SHA512

    a26e11ff355fcfa6ca7cb0497a8b093f4746e8be0892fff41dae5cf128e3f09f5ffecd793e9bd32864006a8ddc7cedf74d097c606496f8e51ee35f5f1f6f67a5

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAp1ftxmbfYQJZKDFxz:7I99DEWVtQApZmn0X

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1028-989-0x00000000032E0000-0x0000000003411000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections