General

  • Target

    1032-619-0x00000000032B0000-0x00000000033E1000-memory.dmp

  • Size

    1.2MB

  • MD5

    60494515258d9b8cc8574bba176f4483

  • SHA1

    2e5de9b084eaddf129619f4587081b4e1afe9661

  • SHA256

    7ff8bb614bcc4bbb50285dc997f3c05c719427cecdea827211148c67566a42b4

  • SHA512

    d1ef13a90d2e49f32565e182c6e23ff9fac3e0efc67559f30479808f6101bb76cea2dca2f2e2138c9821ecb135d0c77b315d5b6ec48285cb066bb3460c83354e

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA61ftxmbfYQJZKk2e:7I99DEWVtQA6Zmn0n

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1032-619-0x00000000032B0000-0x00000000033E1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections