General
-
Target
2cfdba6fcd48a3047b93b72092061bf1fac2511f74f8c747215a7c3aaf2a9102.bin
-
Size
93KB
-
Sample
220211-pd6vzseccn
-
MD5
0cc3c68cab1dc15162542137a8774d78
-
SHA1
a22f1b191f6922ec9d3735fc6f077d6ff2129337
-
SHA256
2cfdba6fcd48a3047b93b72092061bf1fac2511f74f8c747215a7c3aaf2a9102
-
SHA512
8a945fe100ba76698b3b16d8c9db1f38f27d684e584bb61ed8d4197fb4dbca97bcc35b95df7640f91da884b7943e3788fde4d732507210650f2cb90130e31ace
Static task
static1
Behavioral task
behavioral1
Sample
2cfdba6fcd48a3047b93b72092061bf1fac2511f74f8c747215a7c3aaf2a9102.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2cfdba6fcd48a3047b93b72092061bf1fac2511f74f8c747215a7c3aaf2a9102.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
marsstealer
http://195124.prohoster.biz/pool.php
Targets
-
-
Target
2cfdba6fcd48a3047b93b72092061bf1fac2511f74f8c747215a7c3aaf2a9102.bin
-
Size
93KB
-
MD5
0cc3c68cab1dc15162542137a8774d78
-
SHA1
a22f1b191f6922ec9d3735fc6f077d6ff2129337
-
SHA256
2cfdba6fcd48a3047b93b72092061bf1fac2511f74f8c747215a7c3aaf2a9102
-
SHA512
8a945fe100ba76698b3b16d8c9db1f38f27d684e584bb61ed8d4197fb4dbca97bcc35b95df7640f91da884b7943e3788fde4d732507210650f2cb90130e31ace
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-