General

  • Target

    b7737850b4f9843c60a23ca39b81fecdb60a04fbcd5839326f854f0a092f95c5.exe

  • Size

    668KB

  • Sample

    240405-b3eadahd67

  • MD5

    1ff8f5b71d19c4faffa31dfdc21fd263

  • SHA1

    cb42386f7fd958812ffcfff9b0c107158eca5994

  • SHA256

    b7737850b4f9843c60a23ca39b81fecdb60a04fbcd5839326f854f0a092f95c5

  • SHA512

    74a1e83bc9a03ffadf78c18a7bb056724c17b6dce3e85ed214282ca38adb47d52a3f8c48c82a1b9c25014c7739f4dcd18faf3a6b81bf90247f6d3086d16698fa

  • SSDEEP

    12288:jkZbvRx3JGXdvLI/tt5AzzCRlr+RGc6xyArqg5GnD8LVduHRvBHnVr7MHWrgcli7:xRWy68/ghD7q

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Targets

    • Target

      b7737850b4f9843c60a23ca39b81fecdb60a04fbcd5839326f854f0a092f95c5.exe

    • Size

      668KB

    • MD5

      1ff8f5b71d19c4faffa31dfdc21fd263

    • SHA1

      cb42386f7fd958812ffcfff9b0c107158eca5994

    • SHA256

      b7737850b4f9843c60a23ca39b81fecdb60a04fbcd5839326f854f0a092f95c5

    • SHA512

      74a1e83bc9a03ffadf78c18a7bb056724c17b6dce3e85ed214282ca38adb47d52a3f8c48c82a1b9c25014c7739f4dcd18faf3a6b81bf90247f6d3086d16698fa

    • SSDEEP

      12288:jkZbvRx3JGXdvLI/tt5AzzCRlr+RGc6xyArqg5GnD8LVduHRvBHnVr7MHWrgcli7:xRWy68/ghD7q

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks