MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6a8d89dce793fe2b3dece3e933914a579153c8b26761c128d3b550d6a5e48995. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MarsStealer
Vendor detections: 15
| SHA256 hash: | 6a8d89dce793fe2b3dece3e933914a579153c8b26761c128d3b550d6a5e48995 |
|---|---|
| SHA3-384 hash: | b312d1274b919f485b430989e42ddc838cd119e008fc753896acf9fe8bb77c3e98df544b08ff535ff371d4adfa659f28 |
| SHA1 hash: | efefa87b3b780242b97768b3e11ad4644c421882 |
| MD5 hash: | 1270a54cd698df5f7420ee5ab890383c |
| humanhash: | beer-indigo-grey-rugby |
| File name: | file |
| Download: | download sample |
| Signature | MarsStealer |
| File size: | 271'872 bytes |
| First seen: | 2023-11-03 07:51:58 UTC |
| Last seen: | 2023-11-03 09:19:30 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ee827750429cc6977e10fe712ee76a8f (2 x Stealc, 2 x MarsStealer, 1 x Smoke Loader) |
| ssdeep | 3072:bPKVoZexdi6X4V/1oVBnFP4+2qqR7ZWawlsW449:eoZextX4V16BFUqqR7ZW9uW4 |
| TLSH | T1AF444C7392B16C62E526C7328E2EC7F83A1DB4608F5537AB12659E2F09711F1C27371A |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 00180a244a651204 (1 x MarsStealer) |
| Reporter | |
| Tags: | exe MarsStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__QueryInfo |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | detect_Mars_Stealer |
|---|---|
| Author: | @malgamy12 |
| Description: | detect_Mars_Stealer |
| Rule name: | infostealer_win_stealc_standalone |
|---|---|
| Description: | Find standalone Stealc sample based on decryption routine or characteristic strings |
| Reference: | https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/ |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | Trojan_W32_Gh0stMiancha_1_0_0 |
|---|
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_stealc_w0 |
|---|---|
| Author: | crep1x |
| Description: | Find standalone Stealc sample based on decryption routine or characteristic strings |
| Reference: | https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/ |
| Rule name: | yarahub_win_stealc_bytecodes_oct_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.