General

  • Target

    4720-419-0x00000000037E0000-0x0000000003911000-memory.dmp

  • Size

    1.2MB

  • MD5

    25c0b1b64ac73788f771a1d155c09a48

  • SHA1

    6f36e7be5646e0b4ac02cbfe5f4fb239acf710b7

  • SHA256

    73c7fb8950f51083741715917db714babedd43fedab6022678cc6cf34aa92665

  • SHA512

    490edaec306ed7d5ccd6f611a60b04b196cf2915111c19188ea28f5a58dc5015b2f61bc87984dd8f9ab13bbe681c8e6cdfdc015f4e5d394608c2fc652dfd0902

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQA51ftxmbfYQJZKZhcU:7I99DEWVtQA5Zmn0Xc

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4720-419-0x00000000037E0000-0x0000000003911000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections