General

  • Target

    1484-362-0x0000000003560000-0x0000000003691000-memory.dmp

  • Size

    1.2MB

  • MD5

    81c42236dd7e50aec6a7eb370a03f46e

  • SHA1

    fa63452d0aeecaec061b12f691449022a651c7e7

  • SHA256

    f8e0d5b17719fff8fa04f50c64d234e6aaf2ceaf1165e66fac9e6e751ac5583f

  • SHA512

    24995c43cb28ce76e3af3acb24ee23ec14c311cc31a0e49b61dd9fd51648a41ce9a6b232f60b7bb21305235b7090753c0f83f9d658a6e360264423d1168034e9

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAR1ftxmbfYQJZKQJO:7I99DEWVtQARZmn0U

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1484-362-0x0000000003560000-0x0000000003691000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections