General

  • Target

    240-16-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    e942f6557771462eccd955e69da62b5c

  • SHA1

    0223870d1e62e5e7696f25f5e593d3e131ed760f

  • SHA256

    6cf178fa683ac6ef0fdd1539e78e9f3f392cf94966a54517750f7db2387bcd7b

  • SHA512

    e67c1a60c5973f1b4816f3d65da98cd43334d9f6c41593ff05437dd529f02776c4edde3ff7a1f9dfb7ab816ae88510e2fdd3a7de8a5b12ebd53f8bb33588c684

  • SSDEEP

    3072:Um/E8k9ZjpIL+zNch12KbAwSaSoJSp8xb8EG:N/E8k91zz6/tb8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 240-16-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections