General

  • Target

    3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe

  • Size

    4.8MB

  • Sample

    240416-z5mljaed5y

  • MD5

    b3605edf698023865b1e65852ff9e627

  • SHA1

    93c8ce5f7dd2e69edd50ef26d00f89b4bfbe20b7

  • SHA256

    3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255

  • SHA512

    e7a82bbcd5bf3c9799248ecb91837e5f94431e7a1ad5515dd847d1b1cfce44b76e37981694ae14e5f1f30eab3d98088ef4751ce9b8b83ea11bbc1d9c95ea8ad2

  • SSDEEP

    12288:937z0DEczgGtM6oHYuFr7H13jeGeTaGHK4juSAxJWjbA/bJLoGI:WD2twmd

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Targets

    • Target

      3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255.exe

    • Size

      4.8MB

    • MD5

      b3605edf698023865b1e65852ff9e627

    • SHA1

      93c8ce5f7dd2e69edd50ef26d00f89b4bfbe20b7

    • SHA256

      3c71bf86bdeb35c1b8b178e99f3193efabf63a55abebb3356426b731c362a255

    • SHA512

      e7a82bbcd5bf3c9799248ecb91837e5f94431e7a1ad5515dd847d1b1cfce44b76e37981694ae14e5f1f30eab3d98088ef4751ce9b8b83ea11bbc1d9c95ea8ad2

    • SSDEEP

      12288:937z0DEczgGtM6oHYuFr7H13jeGeTaGHK4juSAxJWjbA/bJLoGI:WD2twmd

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks