General

  • Target

    3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8.bin

  • Size

    93KB

  • Sample

    220204-rblhdaahbl

  • MD5

    8ca753bfe600c706450ed63844d97136

  • SHA1

    63cb396f48c852efcb9d8e6925cf1eff5c33debf

  • SHA256

    3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8

  • SHA512

    c52608b4c9f8f3fa2c3153413beb6e2ffd66778e173555fb94be70231dad760d018e776e321565f54eede1cb6e530305455dfdcdfe862250f529d56fd393acdb

Malware Config

Extracted

Family

marsstealer

C2

http://sadasew94okl234.000webhostapp.comd1c107a865581ff88ad673786ee059f2.php

Targets

    • Target

      3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8.bin

    • Size

      93KB

    • MD5

      8ca753bfe600c706450ed63844d97136

    • SHA1

      63cb396f48c852efcb9d8e6925cf1eff5c33debf

    • SHA256

      3a950b6406e9f4098accf439b350ac1f56276e97a23c63394b0a558c96ec0ea8

    • SHA512

      c52608b4c9f8f3fa2c3153413beb6e2ffd66778e173555fb94be70231dad760d018e776e321565f54eede1cb6e530305455dfdcdfe862250f529d56fd393acdb

    • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

      suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks