General

  • Target

    2820-353-0x0000000003760000-0x0000000003891000-memory.dmp

  • Size

    1.2MB

  • MD5

    8be9ca7436014490c9860224bb413e17

  • SHA1

    1989c58e85f5cabca2620e022f1c148df47427a8

  • SHA256

    735744c8dfa8ace455a066393f2d2aa11e6c85076b401e4f9d2dc10fc3ead319

  • SHA512

    3e47743129cc42b2d19565442fd745a965dc1ccada9da59e5810d641bbb4438226b483bd4cd73651542909d094d2dd2ca80d536fb96c3f1188e44f5d2ac0290a

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAx1ftxmbfYQJZKQpTY3:7I99DEWVtQAxZmn00

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2820-353-0x0000000003760000-0x0000000003891000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections