General

  • Target

    1936-91-0x00000000032B0000-0x00000000033E1000-memory.dmp

  • Size

    1.2MB

  • MD5

    974f84687c59bafbabc97f3e872d5a01

  • SHA1

    75a8183ca07fe3700b93c38e2b2ea7175bde7400

  • SHA256

    2ba05404ded49380e9209179cc0b9b86b665f7cfcc19630e89f09177da037d29

  • SHA512

    f773add966a3380e1e241f7b583e03a591a387e17fe1d0a4c295432291cded9ec31dac221621c3cb65cc11524ec399e46b3171881bb7ad930296f6d225417a56

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA61ftxmbfYQJZKl2f:7I99DEWVtQA6Zmn08

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1936-91-0x00000000032B0000-0x00000000033E1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections