General

  • Target

    400-1196-0x00000000035E0000-0x0000000003711000-memory.dmp

  • Size

    1.2MB

  • MD5

    1a6a2e1ab7616a4bda4931f1206c8e47

  • SHA1

    4e8b908a8d07e2d449b1951116dd4164c8600346

  • SHA256

    8fbfc25e9b891e4d2921348575c912a6b84d7cbc0d15e54835082a2232e241e5

  • SHA512

    2437cdaa768f4144b43692c0994dbec227e3359bd70502443a14b926f67a586172970c0eb712a1d14d39bfa0568543b7716af32302a182e19ad9a7f1f56d6e22

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAZ1ftxmbfYQJZKiB4:7I99DEWVtQAZZmn0C

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 400-1196-0x00000000035E0000-0x0000000003711000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections