General

  • Target

    24426a615e821fbffa83ea6e5b2632ca.exe

  • Size

    1.7MB

  • Sample

    220830-ag7jcsaag4

  • MD5

    24426a615e821fbffa83ea6e5b2632ca

  • SHA1

    a67b017fc43a7a58d5b77b8a0f452d3fcd87914e

  • SHA256

    eb58e5135790901dd0cb00adc0918321838af45df9488aad01b6857ccd822e5f

  • SHA512

    eabf749174dc7a7580ff2a4bc23878e12069e06834d506b8db48088deacf8a5f569506d259fb0499e898f4f1c000b294d2dfbcf83cb6e561a86c1bf8c6b2dc7e

  • SSDEEP

    24576:Ez+OdR/U4yrxD/wXzWJfLheE8arMVlcgHwgmFB9P+fPswOwkgB3JI5Ri2dGE7e+W:idRRyWYLnj8cgk+fEGB3i5REue+Q/2O

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

185.243.113.15/FJNEjnp9.php

Targets

    • Target

      24426a615e821fbffa83ea6e5b2632ca.exe

    • Size

      1.7MB

    • MD5

      24426a615e821fbffa83ea6e5b2632ca

    • SHA1

      a67b017fc43a7a58d5b77b8a0f452d3fcd87914e

    • SHA256

      eb58e5135790901dd0cb00adc0918321838af45df9488aad01b6857ccd822e5f

    • SHA512

      eabf749174dc7a7580ff2a4bc23878e12069e06834d506b8db48088deacf8a5f569506d259fb0499e898f4f1c000b294d2dfbcf83cb6e561a86c1bf8c6b2dc7e

    • SSDEEP

      24576:Ez+OdR/U4yrxD/wXzWJfLheE8arMVlcgHwgmFB9P+fPswOwkgB3JI5Ri2dGE7e+W:idRRyWYLnj8cgk+fEGB3i5REue+Q/2O

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks