General

  • Target

    4808-345-0x0000000003740000-0x0000000003871000-memory.dmp

  • Size

    1.2MB

  • MD5

    efd853ef605c90550a32ce3c9618a510

  • SHA1

    7a6ad4c6195087c8675df2bc01308c74606e3093

  • SHA256

    5e0be20bbcc4ab7149ef7a05484e12a2b28bfbcae88a39f147cb58476fb14a74

  • SHA512

    ba183008923e7f9591be79b239bf0ce0fc3558a9f2234e4e63e1ac9ea9afec100949f824a51988ce16975dddd7f4bc3594cd2d591a9d1a2cd9edd9c64d2114fa

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAj1ftxmbfYQJZK4Pn:7I99DEWVtQAjZmn0a

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4808-345-0x0000000003740000-0x0000000003871000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections