General

  • Target

    1364-9-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    9d9dd65c709d5b14f4f2e5b0ee9ea881

  • SHA1

    9b0c6c6207e9942e05f6e9fe7bf2e7d210e1ae53

  • SHA256

    51cb71ecb367754d09285dd9e19ec677837ad2c76bf033a58752f1a803be9d7f

  • SHA512

    de5176c46b9921b139bb6dedabcf629b007a2bd885bfd52f71a1731f38c485b80cfa69d257bfc3e1a77bd21a469e5a22ed8047d8f9e99acbf1efcb37a66728df

  • SSDEEP

    3072:Um/E8k9ZjpIn+zNch12KbAwSaSAJSp8kzb8EG:N/E8k91rz6/tOn8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1364-9-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections