General

  • Target

    4764-400-0x0000000003300000-0x0000000003431000-memory.dmp

  • Size

    1.2MB

  • MD5

    b8630b3c3268a243103a6e7ae162bb3a

  • SHA1

    88bf421461c1279a9577f8f134bc21dc4b7fc299

  • SHA256

    c77b50aff96ad0f9153851900641e1a9844ce0287c86b126a7a0ed63746c61f2

  • SHA512

    b721094839549f178fb5df888d9efcce362aa8c88275ed71877816dfb5061c200423e85db0a159b920085fb3685603215a26ac50e320d0146532bf2a57b32f56

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAP1ftxmbfYQJZKa7f:7I99DEWVtQAPZmn0Q

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4764-400-0x0000000003300000-0x0000000003431000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections