Behavioral task
behavioral1
Sample
Mars_Stealer_cracked_by_LLCPPC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Mars_Stealer_cracked_by_LLCPPC.exe
Resource
win10v2004-20230915-en
General
-
Target
Mars_Stealer_cracked_by_LLCPPC.exe
-
Size
93KB
-
MD5
ad4e2f3c8410aa7408fe3dda19a5db67
-
SHA1
0cefc167932d7d037889923536f061d4c64ee38b
-
SHA256
0d4c0d403392a31a1a2ab7b9b478ea3a89cdb14c862990a290ef20adec03437b
-
SHA512
0a191d63b7a40e4c8cf94a34ec2dceec55ca259837a31106fc6f44885a7992fd0ccab019e7122f9ed95efe7f05460354895be0a22c74230949ad874787a78ba1
-
SSDEEP
1536:gWTHVn5wa8TXvqHp6kzWgDaO3C54Gf3lagvHkMTafiyVDr1lVUQ3jy0:gWTHVn8TXvc4O3CFvlaSED1P7j/
Malware Config
Signatures
-
Arkei family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Mars_Stealer_cracked_by_LLCPPC.exe
Files
-
Mars_Stealer_cracked_by_LLCPPC.exe.exe windows:5 windows x86
4c665f81387442ad965e3f4eba69f083
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strstr
strncpy
getenv
rand
srand
_mbsicmp
_putenv
strtok
memcpy
memset
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
LLCPPC Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE