General

  • Target

    1060-377-0x0000000003560000-0x0000000003691000-memory.dmp

  • Size

    1.2MB

  • MD5

    244308a32e0e9ca8384b72c917efb800

  • SHA1

    79915c840668debb91551d313116f0318f0dabe1

  • SHA256

    76584f599ada6fad16c93b9db66c1e88fdaebc73ec61c73c505e1d628b423cf0

  • SHA512

    625a906dca2ea06447deda0161910d261d0cc414ead076350b662bfd54a78c455ece8602f034794a46a1568cc6688ed24bfc001a49b5bb1829fbf07bcd817a9f

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAR1ftxmbfYQJZKVJn:7I99DEWVtQARZmn0L

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1060-377-0x0000000003560000-0x0000000003691000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections