General

  • Target

    8669e8f71fd06872bbc1d2399c33d7b1.bin

  • Size

    212KB

  • Sample

    231226-cb5tpadgar

  • MD5

    5db8438f9c8a8f0a3a4235299ce1d903

  • SHA1

    c9cc44ab99d2c21eec791668f96d6952bb160355

  • SHA256

    83a7161de690b24c70fa23c2834371ffc892c51f6821d1da765c7e4d30e9c25b

  • SHA512

    6cdeec437539668ff7c1b0ef5b0c395f3a5ffb8e9866f777e225f6a0ed096bb3e6ba465d62dee4dc2a6f0a2c73a42233e325a2d36d57326d17333638cbfc0b8a

  • SSDEEP

    6144:mPq0t4rY75AtUvZfvjFgG+50RCC1MGpbXaZ:Cjt+YcKvjV+6RNpb8

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

www.msk-post.com/server/init.php

Targets

    • Target

      b7d757263aac8d89154f7962550b795cca99e2df080d8bfdfbc3582b1a0d8d43.exe

    • Size

      3.8MB

    • MD5

      8669e8f71fd06872bbc1d2399c33d7b1

    • SHA1

      6cdcbc65e5b4d30c3e2e9e3e2c7ad4ed8373bcc5

    • SHA256

      b7d757263aac8d89154f7962550b795cca99e2df080d8bfdfbc3582b1a0d8d43

    • SHA512

      b353fb22d846994f6c09258cccf63f92ae9db14e4dc5965bc67c7c539bdc8f51e599c7bb70a6668d8d6aeacb1551e333ae70630e1ac58f21c49032052dffa847

    • SSDEEP

      12288:zNS9x1JXkDAoqsTAoFhb6lRZu4W1K8waHyu2Um4ytvqMNVw2LW86B7SiU:zeAzW4f

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks