General

  • Target

    4200-473-0x0000000003710000-0x0000000003841000-memory.dmp

  • Size

    1.2MB

  • MD5

    4cba789d3f877f2a912c43737b8310c6

  • SHA1

    af15fe7f4821a97fd92a30cfb78f2bc5b895b15b

  • SHA256

    69b1e4b0bb1fb335aa4d19b8c5156c30587cff7434ce74e8ccc514cd6124b334

  • SHA512

    ce47e9a1e73c53362744ae189385d89c716b8bdd98c305038f8b8dd7dfa3710be75b56eddbd40973848a57c81bb8ab3db33069d795f2ff18a784e05843150682

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAE1ftxmbfYQJZKeykq:7I99DEWVtQAEZmn0eH

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4200-473-0x0000000003710000-0x0000000003841000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections