General

  • Target

    4800-372-0x0000000003440000-0x0000000003571000-memory.dmp

  • Size

    1.2MB

  • MD5

    88a7e97ff639031850358c82088b6f66

  • SHA1

    8eecf02f2018e1db2976739cad311e3b7acfcaaa

  • SHA256

    2d180b475be5a402fb9a3b355343e6fe521ddcb3e4e2c860a73be0530adbaad7

  • SHA512

    93e3fa9d0f98c22c4cf9de929d0aa6f21ccacd14183e2f6d19f1b5e0d10e49282a1ad6c2649cfca0d31c26e1cfe0af44a3c64e876ae710335924b602f72a5035

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAz1ftxmbfYQJZK7/O:7I99DEWVtQAzZmn0z

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4800-372-0x0000000003440000-0x0000000003571000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections