General

  • Target

    5812-650-0x00000000033B0000-0x00000000034E1000-memory.dmp

  • Size

    1.2MB

  • MD5

    8d03383cfcb224f8335c761e944a221f

  • SHA1

    1c00dc0faa75dff341d1fbae9f5a49091a66b6b8

  • SHA256

    a3415c599c0f71afebeee4e9da0dde13e1a8350d185a7814f61da939f588d189

  • SHA512

    b6f05738a64030446e714f5502ce270f79d370885a74c419bfe98a1552a0ebbd3c403585c866ed0dc45f45f41a9c70f942374a387816168ec9a2defaf04bcad5

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAK1ftxmbfYQJZK3GW:7I99DEWVtQAKZmn02

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5812-650-0x00000000033B0000-0x00000000034E1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections