General

  • Target

    3068-14-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    8ad7cf5d4a792255d48c9a16147afe36

  • SHA1

    2b04dad5840a70d548c2b1a2e13cca0a9774ed01

  • SHA256

    a035c771f37d98b613f735a9cc9ec07e45e092d419b5e88b51b860cea069be9d

  • SHA512

    bade68416347cabbb67d88e75dc469ff999a8230d2472bf8b599d5d6319ccef87e3ebd87f936f73d8dbc0a9499272c568249ac52b392a9a869fee97f602bdbd6

  • SSDEEP

    3072:Um/E8k9ZjpIn+zNch12KbAwSaSxJSp8bb8EG:N/E8k91rz6/tE8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-14-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections