Once executed, Mars Stealer performs a series of rapid data collection tasks:
: To maintain a low footprint, it often uninstalls itself immediately after the stolen data has been successfully exfiltrated to the attacker's Command-and-Control (C2) server. Distribution and Evasion eSentire Threat Intelligence Malware Analysis: Mars Stealer MarsStealer_8.zip
: It features more robust anti-debugging and anti-sandbox techniques, such as custom encryption algorithms and configuration formats designed to frustrate static and dynamic analysis. Once executed, Mars Stealer performs a series of
Technical analyses from researchers like XJunior highlight that Version 8 marked a shift in how the malware operates: including popular browsers (Chrome
: The malware targets sensitive data across more than 100 applications, including popular browsers (Chrome, Firefox, Edge), 2FA plugins, and over 50 cryptocurrency extensions. Functional Capabilities