General

  • Target

    1578590b1e0234b07316d604370a087b.bin

  • Size

    217KB

  • Sample

    231224-bh6h5acccj

  • MD5

    45da570966e16a0d455a3214bbedf2ac

  • SHA1

    e23c631ecddad5a0c161a9ab6c0a09d6485505ad

  • SHA256

    d4ff635739b78e4033042ef5df1df720b46a727643d8a3e8dc6df34bf179a40f

  • SHA512

    e695eef749c2505af89d2fafcde55bffe0bf41a14f9bae51f00a5949e1af6f39276dcaa4ab67c74bb98d33c2a963c11eef4bd1988a1445cea2115daa9cf35efb

  • SSDEEP

    6144:jmHOBPnsPVWcLM/UgvnVvot50hzjDsMstB:6H80OmCjDsttB

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

www.moscow-post.su/su/wp-content/lozzz.php

Targets

    • Target

      c498dec6b5bae2d62448ffb450fa594f0c0e55c7424923d602386dbdb6c61503.exe

    • Size

      465KB

    • MD5

      1578590b1e0234b07316d604370a087b

    • SHA1

      ef865b18e16d6a74e38d3aba0d09600d0d450e3e

    • SHA256

      c498dec6b5bae2d62448ffb450fa594f0c0e55c7424923d602386dbdb6c61503

    • SHA512

      4ab2b5847ca31f07dbdb9d7043d462f8556562f30b23827f8b75bc15b4c57e295d56cc93a71a9ab45468ffd985452c79cd89975d3acd13f1146097687f33b974

    • SSDEEP

      12288:YOZQdNMfxzE94hzovW/0NiqjAQeaDVI9VyvSBwoYE6xPqd2cftuw2:YYZqrNiTqaBb

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks