General
-
Target
24426a615e821fbffa83ea6e5b2632ca.exe
-
Size
1.7MB
-
Sample
220830-ag7jcsaag4
-
MD5
24426a615e821fbffa83ea6e5b2632ca
-
SHA1
a67b017fc43a7a58d5b77b8a0f452d3fcd87914e
-
SHA256
eb58e5135790901dd0cb00adc0918321838af45df9488aad01b6857ccd822e5f
-
SHA512
eabf749174dc7a7580ff2a4bc23878e12069e06834d506b8db48088deacf8a5f569506d259fb0499e898f4f1c000b294d2dfbcf83cb6e561a86c1bf8c6b2dc7e
-
SSDEEP
24576:Ez+OdR/U4yrxD/wXzWJfLheE8arMVlcgHwgmFB9P+fPswOwkgB3JI5Ri2dGE7e+W:idRRyWYLnj8cgk+fEGB3i5REue+Q/2O
Static task
static1
Behavioral task
behavioral1
Sample
24426a615e821fbffa83ea6e5b2632ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
24426a615e821fbffa83ea6e5b2632ca.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
marsstealer
Default
185.243.113.15/FJNEjnp9.php
Targets
-
-
Target
24426a615e821fbffa83ea6e5b2632ca.exe
-
Size
1.7MB
-
MD5
24426a615e821fbffa83ea6e5b2632ca
-
SHA1
a67b017fc43a7a58d5b77b8a0f452d3fcd87914e
-
SHA256
eb58e5135790901dd0cb00adc0918321838af45df9488aad01b6857ccd822e5f
-
SHA512
eabf749174dc7a7580ff2a4bc23878e12069e06834d506b8db48088deacf8a5f569506d259fb0499e898f4f1c000b294d2dfbcf83cb6e561a86c1bf8c6b2dc7e
-
SSDEEP
24576:Ez+OdR/U4yrxD/wXzWJfLheE8arMVlcgHwgmFB9P+fPswOwkgB3JI5Ri2dGE7e+W:idRRyWYLnj8cgk+fEGB3i5REue+Q/2O
Score10/10-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-