General

  • Target

    916-423-0x0000000002F90000-0x00000000030C1000-memory.dmp

  • Size

    1.2MB

  • MD5

    a97315e65780c76601ef94e2a3acff2c

  • SHA1

    0f73802591a9f283e57319b0245c7cb3ba4f86cb

  • SHA256

    47b6dc809d40ef2feee0490dc29172b1e4fd87cb4089b803733e0468aa51b478

  • SHA512

    ef15112e832d42b5834c1ed5df99e1a1d513eddab1b819e08b17b9420de0a010727bb16fc2793e370ff12043014889e44636fd01f772d0aded08c82c340c236f

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAM1ftxmbfYQJZKULi:7I99DEWVtQAMZmn02

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 916-423-0x0000000002F90000-0x00000000030C1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections