General

  • Target

    2172-91-0x00000000043E0000-0x000000000450E000-memory.dmp

  • Size

    1.2MB

  • MD5

    478fcdef4286a4af346411667016bb1b

  • SHA1

    46123e9e5b494d561d5071027f4cb455fb9b1fca

  • SHA256

    394fb1ccd794ee3bbcad523a9db610b1478924669b79f8cc8431045187fce8a7

  • SHA512

    ff69a1a11629ae6f76c2796d9186bfc3d781b6d603fc6638729858e0361672bdb2f52831778bc17368dd9c74162fefdba1b15441d0699f00bac2594e08f9ef32

  • SSDEEP

    24576:mRzZLwJgaf+HLBKKbvDhWXBFQWICuoEf8rLAiRXZrACN:ELwJRf+HpGQWIvfmFZ1

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2172-91-0x00000000043E0000-0x000000000450E000-memory.dmp
    .dll windows:6 windows x64 arch:x64


    Headers

    Sections