Behavioral task
behavioral1
Sample
2500-434-0x0000000003620000-0x0000000003751000-memory.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2500-434-0x0000000003620000-0x0000000003751000-memory.dll
Resource
win10v2004-20230915-en
General
-
Target
2500-434-0x0000000003620000-0x0000000003751000-memory.dmp
-
Size
1.2MB
-
MD5
382f067f29b41637e1bff093aa6d237e
-
SHA1
ce1133442ace40f023e23edd897d45a718b37b89
-
SHA256
bf3d66bc251a6a886b3ba3202965cc0077313690c015c0478ac0d0f9085e4953
-
SHA512
ceb6b41c71b6c4a50bdea7b42f919568d1f96a3a8324b6697686d5d4ae12d9b4b515d5ab680a5399f5a058c1c3e428ae687faa87f76df8bd1271d955914845a0
-
SSDEEP
24576:3C7CI9TZDEWk1wCy0zaG9cQAt1ftxmbfYQJZKxFB:7I99DEWVtQAtZmn0j
Malware Config
Extracted
fabookie
http://app.nnnaajjjgc.com/check/safe
Signatures
-
Detect Fabookie payload 1 IoCs
resource yara_rule sample family_fabookie -
Fabookie family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2500-434-0x0000000003620000-0x0000000003751000-memory.dmp
Files
-
2500-434-0x0000000003620000-0x0000000003751000-memory.dmp.dll windows:6 windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Sections
.text Size: 906KB - Virtual size: 905KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 215KB - Virtual size: 214KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ