General

  • Target

    2372-1-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    1775fdce5e3ab5f34f4ec41ca7888188

  • SHA1

    5e8fbeaf64b53fa1c16598fd60cf00303f64e936

  • SHA256

    ea1ca5d3d58a4873760f6f96d84b15f638b9a47a1f13ebdf84f3577e407dada7

  • SHA512

    adf85d0a52b9f4bf03e784a2c9fa30eabcfb3dbe29d97d81fbec8fb7702a1475b6c499074d01783fb9f2214f8ee8563a85f84a359caba129000541bf5505d783

  • SSDEEP

    3072:Um/E8k9ZjpIL+zNch12KbAwSaSVJSp81b8EG:N/E8k91zz6/tq8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

dispatchweekly.com/b2ecfe73736f99f5.php

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2372-1-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows x86


    Headers

    Sections