General

  • Target

    4964-10-0x0000000000400000-0x000000000043D000-memory.dmp

  • Size

    244KB

  • MD5

    fdbd16ad3e5db8dcd274f7784eef7136

  • SHA1

    0302338eedcb16f59e7a824b026ca69253c13fb5

  • SHA256

    1508a8df541c1405c538a6b20d004b1e423f5b70f0d326b24694750c4fe2d56e

  • SHA512

    e81442dee19f009273c1945de6514d9e97bfbe8089beba1bfeb2ed7e98262bc1979750c494d96249f5840852c5ec78ae26ec374c0e7a98eb1ca3d8fd697a1d02

  • SSDEEP

    3072:Um/E8k9ZjpIL+zNch12KbAwSaSqJSp8Fb8EG:N/E8k91zz6/tB8EG

Score
10/10

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Signatures

  • Marsstealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4964-10-0x0000000000400000-0x000000000043D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections