General

  • Target

    704-481-0x00000000034C0000-0x00000000035F1000-memory.dmp

  • Size

    1.2MB

  • MD5

    10f3c121b7d11392b371b66bd5df8028

  • SHA1

    71b8b576e9cce7319aeadbcbe1690b1f31a84a32

  • SHA256

    1cb3cd4556af784b1351395beb50191a254fee696862f75ca47aebab249b0830

  • SHA512

    5e4a8423cb87b480040172d0eb14b26ab38e2430e73bf566a51ee9b21ec077a08009c8d83079e50724a3961ee9acdcb07c34fdb64c9999b4baacb51565a233df

  • SSDEEP

    24576:3C7CI9TZDEWk1wCy0zaG9cQAb1ftxmbfYQJZK336:7I99DEWVtQAbZmn0n

Score
10/10

Malware Config

Extracted

Family

fabookie

C2

http://app.nnnaajjjgc.com/check/safe

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 704-481-0x00000000034C0000-0x00000000035F1000-memory.dmp
    .dll windows:6 windows x64


    Headers

    Sections