General

  • Target

    4552-412-0x00000000039B0000-0x0000000003AE1000-memory.dmp

  • Size

    1.2MB

  • MD5

    f3ccec9c7829af5be780d94cb654680b

  • SHA1

    96f7732c6125e74d84aac0d555b465526e81f8f4

  • SHA256

    d6fe1bba4262bf58f244c7ad0242456e2484106cd42567c3250a97a7754967f3

  • SHA512

    4b23b16855667e39ad83090bfe52e7e9a1f157ddc1b6dc670249ff2ada68a4bf9b7811346a5299dd3a95e7cc6270265ceae9f8812a9c7df27065d86fae6e72d1

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAq1ftxmbfYQJZKBm1:7I99DEWVtQAqZmn04

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4552-412-0x00000000039B0000-0x0000000003AE1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections