General

  • Target

    f836f277cbcadfecfc988bf350d410c3.bin

  • Size

    272KB

  • Sample

    231227-cj4atsaaa2

  • MD5

    31e70d40567b29daba819970f91bcfc2

  • SHA1

    607d10e33bc0465debfa63f584c9120deae0d0ad

  • SHA256

    932cc576c0ef07459fa9b486453c0023c0bc35240b44b38622b1bcd3c28ee785

  • SHA512

    57ab8f10a27b6cdda83539dbd0e8a97e7264d34ac9daf403e40bbdd563d08e925605f3954479cd2168af0f15bd049c78005abb9587dd746c43cbc5151557c108

  • SSDEEP

    6144:68ky03giDKctGQUBU/sGzP3znrzLBW9E7REBBRwP/HBZi+I:V0w2tP3tzfjv1W9E7OfRwPPBs+I

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

moscow-post.com/xaoniu/server/waungowangued/g.php

Targets

    • Target

      d38bc9871b0eba08a6b77314a6d3fdc94531315c2659ea60d8d23b4450ed3838.exe

    • Size

      4.9MB

    • MD5

      f836f277cbcadfecfc988bf350d410c3

    • SHA1

      f9a66d7876a6eb09763e0705beaa999d99f53754

    • SHA256

      d38bc9871b0eba08a6b77314a6d3fdc94531315c2659ea60d8d23b4450ed3838

    • SHA512

      ac284e90bf72d564ceaeda28383efc8793f286002d2d7ae37f08f05a9170faa5f77a8e741cb60fabb1f48f9abc769070fc3620fa9c5d7dfce60029b6d58c8280

    • SSDEEP

      12288:D6BeSpuojQEv1E729k4nRQ/ceb5WdWOeoP3/F+2nGr6A5zuzhGlC5LcB+cVgeMtb:E0yLW2mudcocIE

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks