General

  • Target

    4864-12-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    b0b4c7af6c72b2bf2f17f4aa5afe3a59

  • SHA1

    15c28cf802326ff0004cf8b90785888e147804c0

  • SHA256

    8c8297ca71abe9a1fd2f1ed26c04bdfb8cf42da958ea7b5fb8ea43e3a9c8ebca

  • SHA512

    c9b6b49cb9c16550782f4b518350543bd3723f9d8084441be0c7d6af88ddae274c7a3d9ef9c9ab2b3f7e5cfb8e7fa9e33a20af95f64ae870cf2c76276f81ab1e

  • SSDEEP

    3072:Um/E8k9ZjpIn+zNch12KbAwSaS7JSp8zb8EG:N/E8k91rz6/tm8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4864-12-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections