General

  • Target

    1020-589-0x0000000002E90000-0x0000000002FC1000-memory.dmp

  • Size

    1.2MB

  • MD5

    c952b9f4001715e13869726e2e225960

  • SHA1

    0af115d2619e0f3070307363cb8461de23a6c43e

  • SHA256

    c9a2f2b18f4516e0f2ea1487a65e13701b0b3a249cb90b47f6b91350af17fa86

  • SHA512

    339e16770de95101ade4438609d177161a5083823d6ca2ffe44f6c93d9dbeaf712a9d42972651557d72d30ca20c2017f6850b08d820fbc191213c15553c84830

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAp1ftxmbfYQJZKfP2:7I99DEWVtQApZmn0H

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1020-589-0x0000000002E90000-0x0000000002FC1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections