General

  • Target

    44168-795-0x0000000003550000-0x0000000003681000-memory.dmp

  • Size

    1.2MB

  • MD5

    234164447c7cd92019c3b7e8d55c47d3

  • SHA1

    c2a8f1a56b0461535a9bd253cb96fb046331aa57

  • SHA256

    c04eb0f851adf0df2847f83ffea969b7e65b64dd88beccf50594a0c62543f3f3

  • SHA512

    fa6ab7d249baa9d8af40121d7e1192e013b09f8ca912bbfeaaf4a3ecdeb3312d29004a567275002a4ea39848ddfa711300e961c23045100b89763ba482f3be47

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAo1ftxmbfYQJZKCgU:7I99DEWVtQAoZmn0D

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 44168-795-0x0000000003550000-0x0000000003681000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections