General

  • Target

    1744-426-0x0000000003610000-0x0000000003741000-memory.dmp

  • Size

    1.2MB

  • MD5

    953c3ddc3f102ac033a87ac2584827e8

  • SHA1

    a43cffc83804eb8dc878332c01d7a9b1dc8304a8

  • SHA256

    90dd57e0f274cc0d843b2466160674395306aaa6353c18ead7b863dfc75ba28d

  • SHA512

    e74cbe8b4ec7eba144fb97b257327d0e972f218bf166361f631e15e54fd99c21b0ed5dd273c88a6a88e849424ab474808fb89a7e63159d0c4af853ec5baf0070

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA01ftxmbfYQJZKJ0x:7I99DEWVtQA0Zmn0i

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1744-426-0x0000000003610000-0x0000000003741000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections