General

  • Target

    8faff89242e941f569ee0852ba3463f26741d68b22627d11555b6cee5ef27676.exe

  • Size

    4.9MB

  • Sample

    240405-bx6sfahc23

  • MD5

    611e8af3116aa80fafc76d0501fd172e

  • SHA1

    0a82193d9485da25f424c6ff28bdde597fe023a6

  • SHA256

    8faff89242e941f569ee0852ba3463f26741d68b22627d11555b6cee5ef27676

  • SHA512

    1ad6fa695b89e9436c3953609337adfa01f6436e3714bc9268c2a3252fb967d9916c121c611f7416d5fe265a46f5fe891f07d02a02d27a8d6664a2fc0705acb3

  • SSDEEP

    6144:1Ss9IYGOxz2RRKOOCxU873xCswRnBOGLeQ5dBRRW6n5FkjdfJauy:t9/X12qOOCxj3x5whwQl2lauy

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

kenesrakishev.net/wp-load.php

Targets

    • Target

      8faff89242e941f569ee0852ba3463f26741d68b22627d11555b6cee5ef27676.exe

    • Size

      4.9MB

    • MD5

      611e8af3116aa80fafc76d0501fd172e

    • SHA1

      0a82193d9485da25f424c6ff28bdde597fe023a6

    • SHA256

      8faff89242e941f569ee0852ba3463f26741d68b22627d11555b6cee5ef27676

    • SHA512

      1ad6fa695b89e9436c3953609337adfa01f6436e3714bc9268c2a3252fb967d9916c121c611f7416d5fe265a46f5fe891f07d02a02d27a8d6664a2fc0705acb3

    • SSDEEP

      6144:1Ss9IYGOxz2RRKOOCxU873xCswRnBOGLeQ5dBRRW6n5FkjdfJauy:t9/X12qOOCxj3x5whwQl2lauy

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks