General

  • Target

    3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8.bin

  • Size

    93KB

  • Sample

    220204-rblhdaahbl

  • MD5

    8ca753bfe600c706450ed63844d97136

  • SHA1

    63cb396f48c852efcb9d8e6925cf1eff5c33debf

  • SHA256

    3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8

  • SHA512

    c52608b4c9f8f3fa2c3153413beb6e2ffd66778e173555fb94be70231dad760d018e776e321565f54eede1cb6e530305455dfdcdfe862250f529d56fd393acdb

Malware Config

Extracted

Family

marsstealer

C2

http://sadasew94okl234.000webhostapp.comd1c107a865581ff88ad673786ee059f2.php

Targets

    • Target

      3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8.bin

    • Size

      93KB

    • MD5

      8ca753bfe600c706450ed63844d97136

    • SHA1

      63cb396f48c852efcb9d8e6925cf1eff5c33debf

    • SHA256

      3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8

    • SHA512

      c52608b4c9f8f3fa2c3153413beb6e2ffd66778e173555fb94be70231dad760d018e776e321565f54eede1cb6e530305455dfdcdfe862250f529d56fd393acdb

    • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

      suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks