Behavioral task
behavioral1
Sample
2936-11-0x0000000000400000-0x000000000043D000-memory.exe
Resource
win7-20230831-en
General
-
Target
2936-11-0x0000000000400000-0x000000000043D000-memory.dmp
-
Size
244KB
-
MD5
18fe7212c364cbc7fa2db1ab3ad87428
-
SHA1
73b75cc9ec43ffa1d20a13af914458628d4fe3b1
-
SHA256
8819e0bd93b3a2e6c5465e75c626dc7d8f493e9d23f3fd5832441b3500899581
-
SHA512
577c8c0abed97ee629a9b4e1eb98f0c5e08ffa1120f0cf63718852fbaf800e87fe12248322a350399942c7c11b6d34d1b0b9d44291330da5efbd96e6445320c4
-
SSDEEP
3072:Um/E8k9ZjpIn+zNch12KbAwSaSVJSp8jJb8EG:N/E8k91rz6/to18EG
Malware Config
Extracted
marsstealer
Default
151.236.218.158/wp-content/log.php
Signatures
-
Marsstealer family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2936-11-0x0000000000400000-0x000000000043D000-memory.dmp
Files
-
2936-11-0x0000000000400000-0x000000000043D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 114KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 864B
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE