General
-
Target
MarsStealer_Menu.exe
-
Size
726KB
-
Sample
250129-xh539avqaj
-
MD5
b684bbb20156d428262380660c83b5df
-
SHA1
684d7b8100a20601a61805d7bb5c30944cde040a
-
SHA256
f591fe6f737e9471d3bc36ae93eecf79ca1971373d477ad4a03ae99c594260d0
-
SHA512
fa09c57f3876a1da9575b953672387a2010aae3ae28b779d68a2901fd89d3a6a21af0562b57cf1b5ef3a74ffef8e36c52d43727e4703762da81d7679bf2de02e
-
SSDEEP
12288:hQXqRba8sXrA1gqWVOmw0dKcaJzkVCp4Lkuc+tSV1pH16oG8HCdIfe+:hQXqsi1OOYdKcoA5kp+S/1JGvdIfl
Static task
static1
Malware Config
Extracted
asyncrat
AWS | RxR
Default
Nightmare15.strangled.net:6606
Nightmare15.strangled.net:7707
Nightmare15.strangled.net:8808
lastofdr51.mywire.org:6606
lastofdr51.mywire.org:7707
lastofdr51.mywire.org:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
System.exe
-
install_folder
%AppData%
Targets
-
-
Target
MarsStealer_Menu.exe
-
Size
726KB
-
MD5
b684bbb20156d428262380660c83b5df
-
SHA1
684d7b8100a20601a61805d7bb5c30944cde040a
-
SHA256
f591fe6f737e9471d3bc36ae93eecf79ca1971373d477ad4a03ae99c594260d0
-
SHA512
fa09c57f3876a1da9575b953672387a2010aae3ae28b779d68a2901fd89d3a6a21af0562b57cf1b5ef3a74ffef8e36c52d43727e4703762da81d7679bf2de02e
-
SSDEEP
12288:hQXqRba8sXrA1gqWVOmw0dKcaJzkVCp4Lkuc+tSV1pH16oG8HCdIfe+:hQXqsi1OOYdKcoA5kp+S/1JGvdIfl
-
Asyncrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1