General

  • Target

    1368-9-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    7d0f7cf60a6a1eb45fe8b06a1c04bcbc

  • SHA1

    8c6c5a4f59ac59628e399b041ce0708e98881a14

  • SHA256

    e31e42f08b98c0746f288c1f8d3079784ea45a371ffd36b383c66e46940fb68d

  • SHA512

    42dcd55820250fc84afae17c217e65e722639adda149bca3d7f8491cccadb001c4c7148f71ce0f549ec854b333769f1b52c40d5bb5d6d229e4639a01c319f97a

  • SSDEEP

    3072:Um/E8k9ZjpIL+zNch12KbAwSaSDJSp8Ib8EG:N/E8k91zz6/tx8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1368-9-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections