General

  • Target

    SENSIXDPANNEL.exe

  • Size

    433KB

  • Sample

    231223-bxdfwsgcg6

  • MD5

    40cf5b7e5c505da78a7f66d2950effbf

  • SHA1

    abf961c5b9fae57411a195a00b4c7093d2fe0bc4

  • SHA256

    911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48

  • SHA512

    08cbfc073c2d0f63a9b2711a81dd30809cb87eb2310ffd5b2a582a1e9ca0ebd5956093e83453310cba25a403aa28bf7cfcb3725a017188d48e66cccccb190bc5

  • SSDEEP

    12288:pyVG1u73Do/eGm5uRWlgfS7BCag7MJQIGhJNsx61V0wrY4FS9:IGS6WRN+JGxS

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Targets

    • Target

      SENSIXDPANNEL.exe

    • Size

      433KB

    • MD5

      40cf5b7e5c505da78a7f66d2950effbf

    • SHA1

      abf961c5b9fae57411a195a00b4c7093d2fe0bc4

    • SHA256

      911221ce521f77139ecfa2a277c277aaee6bff7094d9c5b31b893a4b104dea48

    • SHA512

      08cbfc073c2d0f63a9b2711a81dd30809cb87eb2310ffd5b2a582a1e9ca0ebd5956093e83453310cba25a403aa28bf7cfcb3725a017188d48e66cccccb190bc5

    • SSDEEP

      12288:pyVG1u73Do/eGm5uRWlgfS7BCag7MJQIGhJNsx61V0wrY4FS9:IGS6WRN+JGxS

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks