General

  • Target

    2864-13-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    458cd1daa6801cc101f4d5e9bc052736

  • SHA1

    06f353de1cb6993a0cc2b0d8605b4bcb055cd609

  • SHA256

    5a1f1a1eb9623c10109dd0383372420a57f44a1dc5242b3d0d12fbdb8ad4d3d8

  • SHA512

    de2b10925842ab9269e9cb6b71d44555c04642be9e7342f49f1c5e0705a6e4866d91b796794f79170b0695517627526fddf11a8ddb5229ea48c1fa97e094f805

  • SSDEEP

    3072:Um/E8k9ZjpIn+zNch12KbAwSaSCJSp8Fb8EG:N/E8k91rz6/tZ8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2864-13-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections