General

  • Target

    2620-348-0x00000000042F0000-0x000000000441E000-memory.dmp

  • Size

    1.2MB

  • MD5

    262a2620fde7c0cda7ca21f1fae8b5e0

  • SHA1

    c80b037149bb322d957c5c14380156c50a37866f

  • SHA256

    ab01793523e9eff1f1bc7be429182d47ca7017d6e659c5ece7ff1242d728fbd1

  • SHA512

    150721a0d1706077b1aeebdb162935052b4b1fe31116b37b680078c6230f41fa018d6bc325a88517056b333220f3c109187fd3db336b44f8d5469ef1ea9d4234

  • SSDEEP

    24576:mRzZLwJgaf+HLBKKbvDhWXBFQWNCuoEf8rLAiRXaMwICN:ELwJRf+HpGQWNvfmFna

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.alie3ksgaa.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2620-348-0x00000000042F0000-0x000000000441E000-memory.dmp
    .dll windows:6 windows x64 arch:x64


    Headers

    Sections