General

  • Target

    1620-81-0x00000000032C0000-0x00000000033F0000-memory.dmp

  • Size

    1.2MB

  • MD5

    60e725045ec5cb5c691232d86e930ac1

  • SHA1

    1e603b8d68b804ffc15bb33ccfac15b823682ac2

  • SHA256

    24bb4e6013ddc5d4d1daf5205dc2223826c503626f5599e32268fce83b823e5e

  • SHA512

    29bec40e5caafdac5eb0d818202aa98719e3bd48dea48d79d9f5334efc86998ab21569a9670d59ab1e6bdc0aee120477e82df2c5206ae36a4064dc2b2764fb85

  • SSDEEP

    24576:F1Ao66zsPiB3gcrREGyGq5/kQWA+sI5iitc3Itv3cVIluu:FW6zwiB3aPCQWA4iiLvMuJ

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-81-0x00000000032C0000-0x00000000033F0000-memory.dmp
    .dll windows:6 windows x64 arch:x64


    Headers

    Sections