General

  • Target

    5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe

  • Size

    14.5MB

  • Sample

    240408-bwyenscg82

  • MD5

    1dba954b14bc941c13917462e368c560

  • SHA1

    ab9eaf52b10a9d270ba0776087456f55ca10c447

  • SHA256

    5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396

  • SHA512

    e952f7d9fdfc63233ed2592251c68d6bb631b80d586a8349731f858e8c4dca266a91c4db2a042df2accdab30044d3f4b5a3517d0ec1f130080609007ef268167

  • SSDEEP

    12288:Mi2f75WQGH5Tua5O7g8+V9rI0djHf1lwNfUNq71j8/37vXu:V8YZO2j3I0dP7P

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

kenesrakishev.net/wp-includes/pomo/po.php

Targets

    • Target

      5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396.exe

    • Size

      14.5MB

    • MD5

      1dba954b14bc941c13917462e368c560

    • SHA1

      ab9eaf52b10a9d270ba0776087456f55ca10c447

    • SHA256

      5e1aba37fd2ab19677b7a59505924bf18d8809037cbbf50b7b22c4a74b421396

    • SHA512

      e952f7d9fdfc63233ed2592251c68d6bb631b80d586a8349731f858e8c4dca266a91c4db2a042df2accdab30044d3f4b5a3517d0ec1f130080609007ef268167

    • SSDEEP

      12288:Mi2f75WQGH5Tua5O7g8+V9rI0djHf1lwNfUNq71j8/37vXu:V8YZO2j3I0dP7P

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks