General

  • Target

    1440-1156-0x00000000034B0000-0x00000000035E1000-memory.dmp

  • Size

    1.2MB

  • MD5

    e8c0a2dca9630b239d083fe9226b31a2

  • SHA1

    b2dcbb2bac367c29564a2dd454d64d9898ade2ab

  • SHA256

    b1c9d2734c5fced3a3a8e998a9644d3f1c967bdcce3748a5b172f4aeed981fcb

  • SHA512

    3a80b31f74a61e03adae9a8557509ff2cd790dfae89680f45642d40ab7f4039d0faabaf48319f830e40b12ceeb70afb512919cb6c5ea110961506eae60b33744

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAa1ftxmbfYQJZKkW2:7I99DEWVtQAaZmn0H

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1440-1156-0x00000000034B0000-0x00000000035E1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections