General

  • Target

    572-1048-0x00000000036C0000-0x00000000037F1000-memory.dmp

  • Size

    1.2MB

  • MD5

    6585f652dc51d1f73e551684f19e2fe6

  • SHA1

    a2a481f12a98e68c50ce7795fb7d3af7cb8de831

  • SHA256

    31602f9bdaf12ad29bcc7641f30011b6b0312c60ae70ee3aaca0d5ccfaab3938

  • SHA512

    d385623b2a467f480a810658113a0050068f469aee346cd69a4bcab57a0aa18d2c33e69d3794a5aefeaaefe99c31743909ec8410e6eb318848f4244aaf6c981c

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA71ftxmbfYQJZKRXT:7I99DEWVtQA7Zmn0p

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 572-1048-0x00000000036C0000-0x00000000037F1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections