General

  • Target

    utweb_installer.exe

  • Size

    5.7MB

  • Sample

    231003-safq6scb6w

  • MD5

    5d735b58f9fe896247dfd619893b830c

  • SHA1

    8fa7c334c12112a61af7177c47e3b824d44e1963

  • SHA256

    566a36b032dc9b2547ca992342151ca1b1d7673e727358f1316c8c67a62ca8a6

  • SHA512

    a9348f244aa7ff90ad0db73ae119ed94d3469caa59978883dd51de952ee166c1ed1f96ecaab218c746e5b7e5ffdfae71b8305f3319741527b81ec0db96b39db2

  • SSDEEP

    49152:SuUT9ho5s6WlsNgoJSFLu2xbpju1rvK1dfZXwPsaYwwZQlF2whluVg8GxNrgnWJk:

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

rakishev.org/wp-mail.php

Targets

    • Target

      utweb_installer.exe

    • Size

      5.7MB

    • MD5

      5d735b58f9fe896247dfd619893b830c

    • SHA1

      8fa7c334c12112a61af7177c47e3b824d44e1963

    • SHA256

      566a36b032dc9b2547ca992342151ca1b1d7673e727358f1316c8c67a62ca8a6

    • SHA512

      a9348f244aa7ff90ad0db73ae119ed94d3469caa59978883dd51de952ee166c1ed1f96ecaab218c746e5b7e5ffdfae71b8305f3319741527b81ec0db96b39db2

    • SSDEEP

      49152:SuUT9ho5s6WlsNgoJSFLu2xbpju1rvK1dfZXwPsaYwwZQlF2whluVg8GxNrgnWJk:

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks