General

  • Target

    Valentina Studio Pro v13.7.exe

  • Size

    11.7MB

  • Sample

    231226-k5llxafeg4

  • MD5

    6c23d52006da52904f755c8268d29ffc

  • SHA1

    8d770ad326a02692e7a223749128d402af94e1a7

  • SHA256

    d183838c3849c3cfcb873bf79de6dd6bc2cf7de60a2c18059d97eaeb1d5c2edd

  • SHA512

    ae64700be9120d3b4e8b1dc0a94ad4131726d72bd92433461e2af505df67e89bf1e3d62d1b47dd6b632dc087dcea5d15ddcad03fa3956379efc854d0d72bd9b3

  • SSDEEP

    12288:Fkbo4c5w0lRq+x83dhmNml3pPw1WIzWTbel9BfrmjsN/pf7Rm:3gqbsmVBfyoN/y

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

www.moscow-post.ru/bark/wpadmin/admin.php

Targets

    • Target

      Valentina Studio Pro v13.7.exe

    • Size

      11.7MB

    • MD5

      6c23d52006da52904f755c8268d29ffc

    • SHA1

      8d770ad326a02692e7a223749128d402af94e1a7

    • SHA256

      d183838c3849c3cfcb873bf79de6dd6bc2cf7de60a2c18059d97eaeb1d5c2edd

    • SHA512

      ae64700be9120d3b4e8b1dc0a94ad4131726d72bd92433461e2af505df67e89bf1e3d62d1b47dd6b632dc087dcea5d15ddcad03fa3956379efc854d0d72bd9b3

    • SSDEEP

      12288:Fkbo4c5w0lRq+x83dhmNml3pPw1WIzWTbel9BfrmjsN/pf7Rm:3gqbsmVBfyoN/y

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks