General
-
Target
852-8-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
Sample
231227-jqez5sdecj
-
MD5
06fbe331c09ca4d186c3de2903196ac8
-
SHA1
f59716de3d48cbbeb0455fbb399a002930e6fd01
-
SHA256
eb9e45503be88d988fa1f526e981b14ffa93440c5173db76a0d672b2b7441b3b
-
SHA512
2e45f2c2e4172882e0f1f9aceda0908f47468b4ad99059f3efed870ebbf0f92f51dec3f992911862adec611d07b3d5cd98300a8edabc607ffb9919f6f36fc5ef
-
SSDEEP
3072:3u/E8k9ZjpIn+zNch12KbAwSaSSJSp8yb8EGB9N7:+/E8k91rz6/tK8EGB9N
Behavioral task
behavioral1
Sample
852-8-0x0000000000400000-0x0000000000440000-memory.exe
Resource
win7-20231215-en
Malware Config
Extracted
marsstealer
Default
www.msk-post.com/server/init.php
Targets
-
-
Target
852-8-0x0000000000400000-0x0000000000440000-memory.dmp
-
Size
256KB
-
MD5
06fbe331c09ca4d186c3de2903196ac8
-
SHA1
f59716de3d48cbbeb0455fbb399a002930e6fd01
-
SHA256
eb9e45503be88d988fa1f526e981b14ffa93440c5173db76a0d672b2b7441b3b
-
SHA512
2e45f2c2e4172882e0f1f9aceda0908f47468b4ad99059f3efed870ebbf0f92f51dec3f992911862adec611d07b3d5cd98300a8edabc607ffb9919f6f36fc5ef
-
SSDEEP
3072:3u/E8k9ZjpIn+zNch12KbAwSaSSJSp8yb8EGB9N7:+/E8k91rz6/tK8EGB9N
-