General

  • Target

    b7d757263aac8d89154f7962550b795cca99e2df080d8bfdfbc3582b1a0d8d43.zip

  • Size

    212KB

  • Sample

    241112-l7m37ayrdt

  • MD5

    c1698e6fb3f7e9802f46103b57ab3d16

  • SHA1

    c176eda5d7668cb7092a375ba960f1dafb22f7f3

  • SHA256

    5509ae84ce80a4229acf22bc9ad22a455fa61189e284fcce97b489a68a3970db

  • SHA512

    93374822bafe2c06283c532511b1b6af1127cedafe503073e77e14ded9b23e33073e59a362786b79662b9d63d7693341f5ee6fa3b222f7e74eea8c893d27c035

  • SSDEEP

    6144:lryWxuEDXUuBPz26EsH/jLMAvmNOgvkD3hgEdmVKDG8:lPAoJPzH/H/HM54gctmVKC8

Malware Config

Extracted

Family

marsstealer

Botnet

Default

C2

www.msk-post.com/server/init.php

Targets

    • Target

      b7d757263aac8d89154f7962550b795cca99e2df080d8bfdfbc3582b1a0d8d43.exe

    • Size

      3.8MB

    • MD5

      8669e8f71fd06872bbc1d2399c33d7b1

    • SHA1

      6cdcbc65e5b4d30c3e2e9e3e2c7ad4ed8373bcc5

    • SHA256

      b7d757263aac8d89154f7962550b795cca99e2df080d8bfdfbc3582b1a0d8d43

    • SHA512

      b353fb22d846994f6c09258cccf63f92ae9db14e4dc5965bc67c7c539bdc8f51e599c7bb70a6668d8d6aeacb1551e333ae70630e1ac58f21c49032052dffa847

    • SSDEEP

      12288:zNS9x1JXkDAoqsTAoFhb6lRZu4W1K8waHyu2Um4ytvqMNVw2LW86B7SiU:zeAzW4f

    • Mars Stealer

      An infostealer written in C++ based on other infostealers.

    • Marsstealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks