General

  • Target

    3472-422-0x00000000032C0000-0x00000000033F1000-memory.dmp

  • Size

    1.2MB

  • MD5

    a3e1f652649f225246f8a83b794c8b09

  • SHA1

    0a00d7a0fcb764cca8fd8720364ac170385e696a

  • SHA256

    dfb41f6a7686717f38522c7fb0ab34ad38902db1226257ac799002a046e6c623

  • SHA512

    8f677cfc93687fcb342e3dd8694d40ec676b9657301e00ab13d43e87e52b6e9710abeec7b66e98fa4545287888eec0fd9f90cc32f5b3a9f74b2b528f8c6ece38

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA71ftxmbfYQJZKpXh:7I99DEWVtQA7Zmn0h

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3472-422-0x00000000032C0000-0x00000000033F1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections