General

  • Target

    4004-400-0x0000000003980000-0x0000000003AB1000-memory.dmp

  • Size

    1.2MB

  • MD5

    f7608cf69699cd3c41bfbbdaf30af5f9

  • SHA1

    f96565b9c1852f14958fed704a06c9e62ecc2e81

  • SHA256

    eac7b6cca3915cd380856e1ea1f84c7b39683ce43100a1e87f2c77eb67b907a9

  • SHA512

    5affa001e53718970c0847b37497948eab8a2469a05c1a0ae39fd04c43ae9b1e16f9e29d13a6787822e74d1acf4498d7e07328b6599da12338310768c5f66bb3

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAX1ftxmbfYQJZKITn:7I99DEWVtQAXZmn0+

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4004-400-0x0000000003980000-0x0000000003AB1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections