MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MarsStealer
Vendor detections: 18
| SHA256 hash: | 743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24 |
|---|---|
| SHA3-384 hash: | 453f57238df44e11dd174a16c83da68e57105431e98cd2f001d23529374eadfd7833c5f94f09718560ad370ef70f5de4 |
| SHA1 hash: | d87cb53b2b10d804721c80894bccbc989df5acae |
| MD5 hash: | cd6646d9eddb6ed8900b5bd9da0597f2 |
| humanhash: | fillet-magazine-skylark-potato |
| File name: | SecuriteInfo.com.Win32.PWSX-gen.10451.24033 |
| Download: | download sample |
| Signature | MarsStealer |
| File size: | 212'008 bytes |
| First seen: | 2024-09-15 16:27:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 3072:yUd26oMw93Ix61HeP3OYfMylQR3iVhMQzQOKYTQ6GFaAio+qrOeJFhc7aKIC+zcX:9b+ZebiQkCQj0Lde6OKIPcOwDEO |
| TLSH | T1FD24123166848F51EFEB0FB0A68FA321EDB067147691979B364DA6060B0239015F57FD |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4504/4/1) |
| Magika | pebin |
| Reporter | |
| Tags: | exe MarsStealer |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://charistmatwio.shop/api
https://grassemenwji.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
Unpacked files
00c66edc8b41592e299f449a6b7a4e3ab949f7cca0c27bba9a279feacc6e5b6b
daf4e8849a3b6011bff41cc2c7decee8c769a4ebf2be3d7316930f40448ddb25
ec9a1bede697caba74ff4666e0317cb3231fe37fbcb9f8821620c52d7d8a4dad
06510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4
c98f17dd444209ad0a6d71221b67cd632bc6409686f750bb5118a7e42eca91e0
d401c3671807726e777b0a0814c4e4f55cf41684746813cad3a7ebbd1d3d7d71
91f03b0ae9dcae932e3043b7cb19cf52541504e9a4510501d9cb2f1ddd6d10f4
2e4deff4bfe5c4ce46b2d0a1f875dbc0933ec2e0f0e4a210990352601c29638e
5afff322d4b56afbe4429c6fd83aa2d699c51dbf4f5495b08ac104f07da8c49d
743948a05fa7b9a001b346699bc9fd4d645b755bc7ef73802b2a139288910f24
32d0ae27d9ae49a224785cd08bae82b0ec4e944145cb2f106873f70fc2908fe7
3f9daff50fd608eb15026903bf89ad2aafae0b344f0fd82e9ea82d4071a781d7
2bac0508680cb0cdf61b10a529c4a97dfc0562fe85b740abfef0ee2ff97a9fc2
d9bb5fc7267c854e20e63ef68546da25e71270c36bcee73e328437c891892945
6d70e80c80af977af8b15cb47304b4cbd78759faa406906ed3a9e0a6dac74773
bf4bd835390e2607c737360a2527ea292bd0451507f93b623d3f9bbf4036c2fe
e48219567f84882f41bb1e957bbd1358e453274ca0d2025505c66779f642bc30
d63d18c67f83e54c77072aa953c5e5c0496a7a4c2ac6ca8bd07e211ee80b3d6c
43e7575547a95e5c4d7b7ad2915c830f252ab206a0baf9691206200a644e7b94
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Detect_APT29_WINELOADER_Backdoor |
|---|---|
| Author: | daniyyell |
| Description: | Detects APT29's WINELOADER backdoor variant used in phishing campaigns, this rule also detect bad pdf,shtml,htm and vbs or maybe more depends |
| Reference: | https://cloud.google.com/blog/topics/threat-intelligence/apt29-wineloader-german-political-parties |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (GUARD_CF) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.