General

  • Target

    4844-12-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    ffc770032f9718fa3a62ae825b9ed163

  • SHA1

    75ec6f0752e1c4ed90713941e3ff14b382377fd1

  • SHA256

    78edd8da71d6002612ae4063c05fd0faeb84d7b368cd2ccf72dd663250950e0b

  • SHA512

    6be945bfb1cc9286e908b2d71a1718b3fdc61ec72173972bc01eb7845225a5bb0e2fa4c1cd915c8cbda304e7f0ddeaa6749a8e0c3809fb44338e27427a0e6819

  • SSDEEP

    3072:Um/E8k9ZjpIn+zNch12KbAwSaS4JSp8Kb8EG:N/E8k91rz6/tk8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4844-12-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections