General

  • Target

    3008-39-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    1a119c4c0e29e8392fe073ec1e392132

  • SHA1

    7aab3c5fdab131cd9a1942196549da478cdbe725

  • SHA256

    dec5d84503df5a8f3d55c38f234be864d75ac8f73a5803c40db88ab487b962b6

  • SHA512

    4ed5200bef0e2cee182632b900322b81ff250965c8f2426f9ac3cbaf9559c82b6a2cb5d9808ff7021cd3a019f2ebd96c28339545a6e241b406e8ef79ed5f9587

  • SSDEEP

    3072:Um/E8k9ZjpIL+zNch12KbAwSaShJSp8Ob8EG:N/E8k91zz6/tN8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3008-39-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections