MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b2d7f1e627e20804800b417f7d4d8a9133c58b16956a35a8885b011cbd7f79bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MarsStealer


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: b2d7f1e627e20804800b417f7d4d8a9133c58b16956a35a8885b011cbd7f79bb
SHA3-384 hash: be8237e2a3768b93138bab68600b9000ac9313bf40d04b40f0719d6cd171625c808b03516a7df99fce24d3111427ae6e
SHA1 hash: df1cd01e9a08177749609ca57d4af8cab9573510
MD5 hash: 00caeff2ff96754a0a6caaec18afc8d5
humanhash: robin-north-arkansas-solar
File name:file
Download: download sample
Signature MarsStealer
File size:1'777'152 bytes
First seen:2024-09-07 16:40:01 UTC
Last seen:2024-09-07 18:19:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2eabe9054cad5152567f0699947a2c5b (2'852 x LummaStealer, 1'312 x Stealc, 1'026 x Healer)
ssdeep 24576:c1GeWQbWNPeZK3By+OntUM2zG6tMSIYu4PF4IosnzjZqKYJBETLLqIYdpCFj0alX:GVaWZI2tzYUSIYu4N4IowUDSTLLr0MX
TLSH T102853396AFB4DE71E699483CFF47818B6F2DCB04D4C725DC00A6847204B6E256A9F43B
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter Bitsight
Tags:exe MarsStealer


Avatar
Bitsight
url: http://31.41.244.11/steam/random.exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
391
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2024-09-07 21:10:26 UTC
Tags:
stealer stealc loader themida

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
97.4%
Tags:
Infostealer Network Stealth
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Searching for analyzing tools
Running batch commands
Creating a process with a hidden window
Launching a process
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
microsoft_visual_cc packed
Result
Verdict:
MALICIOUS
Result
Threat name:
Stealc, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Stealerc
Status:
Malicious
First seen:
2024-09-07 16:41:05 UTC
File Type:
PE (Exe)
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
Score:
  10/10
Tags:
family:stealc botnet:rave discovery evasion stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks BIOS information in registry
Identifies Wine through registry keys
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Stealc
Malware Config
C2 Extraction:
http://185.215.113.103
Unpacked files
SH256 hash:
8d3a3fdbc9540341f0457bf83b0c50200c6bfafc1ffb3b37f7c5503e84b5804d
MD5 hash:
1c596fcf0cd2628421d4e9c968b9013a
SHA1 hash:
e3568efacecdfb136a65e97e826cbc18edf5753a
Detections:
stealc win_stealc_w0 win_stealc_a0
SH256 hash:
b2d7f1e627e20804800b417f7d4d8a9133c58b16956a35a8885b011cbd7f79bb
MD5 hash:
00caeff2ff96754a0a6caaec18afc8d5
SHA1 hash:
df1cd01e9a08177749609ca57d4af8cab9573510
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

MarsStealer

Executable exe b2d7f1e627e20804800b417f7d4d8a9133c58b16956a35a8885b011cbd7f79bb

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical

Comments