General

  • Target

    1492-64-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    45c2cef2d6df48cc86ff2c61ea3584a2

  • SHA1

    090e12e6b6b7cf7f849f5b593814fb8e67407d73

  • SHA256

    49ca9d0568e5f235d7e4d695cfc0a58515e95489cd3132de5b27822dce6778d3

  • SHA512

    d5badee61cfd74e6b8d7922a5c4274ab1f2e4b559b47012d78c7b7748028b09096b5ff1cf430d06c7ae78447ea00fe7967669d8df269fd9480288095f89bf524

  • SSDEEP

    3072:Um/E8k9ZjpIn+zNch12KbAwSaSYJSp8H/b8EG:N/E8k91rz6/tx8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1492-64-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections