General

  • Target

    4744-164-0x0000000003470000-0x00000000035A1000-memory.dmp

  • Size

    1.2MB

  • MD5

    a28b5ffb6a037a70e14d3df81642b463

  • SHA1

    79fcb813456f055ffa6f1b942c31490771e136e7

  • SHA256

    cd8056b617941cce4fc7e39d7f483a535e1523b76b4df29d685d12f4f5af1974

  • SHA512

    17128ff3f7b566d4cecc6b38aaa5a6fa96def615f7e8778077a74bc2089c64dee43fc57029b18cd2792d8c33b47904c24ec41cde255139e20b068e3f6dbf15f0

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAm1ftxmbfYQJZKZ6c:7I99DEWVtQAmZmn0U

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4744-164-0x0000000003470000-0x00000000035A1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections