Resubmissions
21-12-2023 18:53
231221-xjlq1abehm 10Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2023 18:53
Static task
static1
Behavioral task
behavioral1
Sample
OperaGXSetup.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
OperaGXSetup.exe
Resource
win10v2004-20231215-en
General
-
Target
OperaGXSetup.exe
-
Size
11.5MB
-
MD5
46431992aa566007949fc4acbc058856
-
SHA1
533e0cef48e51095f1460fd52cc542923d23d29d
-
SHA256
846f5e52aa6b4f11a29cab1f505463938938c3c5ad8d753fe70a148200c8c446
-
SHA512
02b1bb111b9db1af37d7f06a36e5f59aac0e9f6a36878db0148f36b7c68ac93f0d136755a8b0a084a510adf2b9eff4cd72b2ab20849a0ea333920557808a2a52
-
SSDEEP
3072:3+fKfLxPq+l/AGDF+FUN9TgPC543HaHJSp8Bb8EGF9N7:OfKfI+l4GDCACS4Kz8EGF9N
Malware Config
Extracted
marsstealer
Default
www.msk-post.com/server/init.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2208 3364 WerFault.exe OperaGXSetup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"C:\Users\Admin\AppData\Local\Temp\OperaGXSetup.exe"1⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 18642⤵
- Program crash
PID:2208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3364 -ip 33641⤵PID:1996