General

  • Target

    2116-390-0x00000000036C0000-0x00000000037F1000-memory.dmp

  • Size

    1.2MB

  • MD5

    81593045c9cf2ed2de5b3d4f095965cd

  • SHA1

    d50553b89f16daa344f1948d8bb2b6e28dbe772d

  • SHA256

    601b83688e95c7273253d7e1bdbc56abd0048ae8dfa185223972fdd65ff97edb

  • SHA512

    467141fbbe10a4e6c65e03e303891207cec998051d9b16024f829e25699efb2d27957806b238d245d3ae23f4ef6eb72ed5f3890ace7dd9e302067a60cb79c5d9

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA71ftxmbfYQJZKtX6:7I99DEWVtQA7Zmn01

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2116-390-0x00000000036C0000-0x00000000037F1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections