General

  • Target

    4628-390-0x00000000030D0000-0x0000000003201000-memory.dmp

  • Size

    1.2MB

  • MD5

    38b0b4d206bd391f8c976f5dd8543ed5

  • SHA1

    61c7d06280d990b323a967b525c30444a4a5c97d

  • SHA256

    9164c011ac7fc12d447c5c79c1ecea65cf8fa4b86b2623a83c948ab43b0168eb

  • SHA512

    e835a091cfb67efee82bfcaf14a12bdcb622ddba79198c64cd50dec9162bb0f59ef0fdc9681b9c6dbbc15acd14e30a5ee38142d906eb6a9a9a1e6f54686be73c

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAg1ftxmbfYQJZK4V4k:7I99DEWVtQAgZmn04i

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4628-390-0x00000000030D0000-0x0000000003201000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections