MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f24fbf9ea72f896074f9b70ce5ae32962c58b18de5976f23eeb06a2089073ae0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
MarsStealer
Vendor detections: 16
| SHA256 hash: | f24fbf9ea72f896074f9b70ce5ae32962c58b18de5976f23eeb06a2089073ae0 |
|---|---|
| SHA3-384 hash: | d9d8855707dcd377b176d4a73608486a7908d0e2bf45285bee7e384127be3005540c00832997ca4d186bdaa68c48b09c |
| SHA1 hash: | 17afe2fde9501c3d35a4c08f21c100b8f23c39a9 |
| MD5 hash: | 0342534b493be64890cd21086c68dc73 |
| humanhash: | yellow-tango-lamp-equal |
| File name: | 0342534b493be64890cd21086c68dc73.exe |
| Download: | download sample |
| Signature | MarsStealer |
| File size: | 257'536 bytes |
| First seen: | 2023-10-12 11:15:41 UTC |
| Last seen: | 2023-10-12 11:53:19 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ddd94c5d785e017fe1e425231535363d (1 x CoinMiner, 1 x Smoke Loader, 1 x Glupteba) |
| ssdeep | 3072:59nG+899zRsOZAzvXe2y2tJUlqkOUlpCP:3nG+Uh21qMXUlw |
| Threatray | 177 similar samples on MalwareBazaar |
| TLSH | T18244BE2176E0C831E4926A325870C2665B7BFCD7E97581CF33943B2E9D312D16A79B43 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 70d0ded0c9d8d2dd (1 x GCleaner, 1 x MarsStealer) |
| Reporter | |
| Tags: | exe MarsStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | detect_Mars_Stealer |
|---|---|
| Author: | @malgamy12 |
| Description: | detect_Mars_Stealer |
| Rule name: | infostealer_win_stealc_standalone |
|---|---|
| Description: | Find standalone Stealc sample based on decryption routine or characteristic strings |
| Reference: | https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/ |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_stealc_w0 |
|---|---|
| Author: | crep1x |
| Description: | Find standalone Stealc sample based on decryption routine or characteristic strings |
| Reference: | https://blog.sekoia.io/stealc-a-copycat-of-vidar-and-raccoon-infostealers-gaining-in-popularity-part-1/ |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.