General

  • Target

    588fe99f2631db84a27bbfceca342f8c.bin

  • Size

    186KB

  • Sample

    240418-bref1agc7z

  • MD5

    32d0273be9405468bc72f50de11228af

  • SHA1

    1f258997be15694fefbcea46804d8a0fac5d87db

  • SHA256

    724d6bc716544962bc5a964381e3ba5689c50e28ebd4fb3fb59a3b8ae1111952

  • SHA512

    ddabc5b85394698d8ac97b555f158ac03fd7f25145704f9cf064219f22663991cbcb6d0161245a36f4bc2a68f8d00116cd92a1babb096e75c0d51fcc8e33add8

  • SSDEEP

    3072:mhF6pSYb4VJwjBSoD6o8B5d7IlnwgDxDKE7cDxmSQcvor6tCJYH4EEuF4X2ez+:+FbK60svLwdDtQxJBEn1EE+4Xzy

Malware Config

Extracted

Family

marsstealer

Botnet

Default

Targets

    • Target

      5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a.exe

    • Size

      1.0MB

    • MD5

      588fe99f2631db84a27bbfceca342f8c

    • SHA1

      84349b654c2f549d85dff6c3a548c7e11f79a5e3

    • SHA256

      5452dc39044f0d4fc32236dda5c4ce986ae5aa33e6e1b653b3ed53fdf1ca745a

    • SHA512

      d00d71d1d1bb8699727914a39190414f332c5be706f66b39ad1b1b8044c2ee7aec17511d784c864660c4c5230d51f69fc577b79ddc37d4c453a66f0bb25d9dfd

    • SSDEEP

      12288:Me/cwY1icfinL+r3FI4PpJEtpnxnI+UejPFnOVy/:/YTr1IDtpnv9P

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks