General

  • Target

    6c23d52006da52904f755c8268d29ffc.bin

  • Size

    356KB

  • Sample

    231228-b3g19shbfp

  • MD5

    da3b924f1a697e1a0b90b12183bb6b18

  • SHA1

    6df1b29dc377b76c53bbf124759615c9d6d057b9

  • SHA256

    b528e70d97a3633d06626303bbf03d1544fdd659169594c61a47aa825237f847

  • SHA512

    84333d6558cf5b12813f341568205ab8fc56608c3f413865b27486dd44088bac99a137faccd34c07d49bdab083cacfbe292d5295408b998d55a142b9d38a24ab

  • SSDEEP

    6144:Ukc7C9es14CgphlZ735OO+nXWIkIBupkROOCVbhN3Ds14XyvmtZhhE0U5DnT8:Uz7MeNXunGFJkRVGLzsmCvqi538

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

www.moscow-post.ru/bark/wpadmin/admin.php

Targets

    • Target

      d183838c3849c3cfcb873bf79de6dd6bc2cf7de60a2c18059d97eaeb1d5c2edd.exe

    • Size

      11.7MB

    • MD5

      6c23d52006da52904f755c8268d29ffc

    • SHA1

      8d770ad326a02692e7a223749128d402af94e1a7

    • SHA256

      d183838c3849c3cfcb873bf79de6dd6bc2cf7de60a2c18059d97eaeb1d5c2edd

    • SHA512

      ae64700be9120d3b4e8b1dc0a94ad4131726d72bd92433461e2af505df67e89bf1e3d62d1b47dd6b632dc087dcea5d15ddcad03fa3956379efc854d0d72bd9b3

    • SSDEEP

      12288:Fkbo4c5w0lRq+x83dhmNml3pPw1WIzWTbel9BfrmjsN/pf7Rm:3gqbsmVBfyoN/y

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks