General

  • Target

    1736-640-0x00000000033F0000-0x0000000003521000-memory.dmp

  • Size

    1.2MB

  • MD5

    72e9cb2311da96048bbabcac4f8e4ccd

  • SHA1

    1a7fcc33fd473c059b088ede51ee90e148764bc8

  • SHA256

    46cf4e3052649bfe594f16994e9828298924087a3530425a746930cdef0281c9

  • SHA512

    19c2ece70ad959de483efae9e9fc5a2879f86b651791055f4d4a15fbd6fd7c9ea255296fa74caa232956c128e1d2a34840d0d95de0964e539247822d115464b8

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA+1ftxmbfYQJZKiZRye:7I99DEWVtQA+Zmn0iZ0

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1736-640-0x00000000033F0000-0x0000000003521000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections