Behavioral task
behavioral1
Sample
Mars_Stealer_cracked_by_LLCPPC.exe
Resource
win7-20231020-en
General
-
Target
Mars_Stealer_cracked_by_LLCPPC.exe
-
Size
93KB
-
MD5
ceb9333cbb1465d3eb035de8f68b505e
-
SHA1
1835c7acbf1f75861cfc31caf9b6bec2964ccec8
-
SHA256
d530d7fcf7c192f622530aa02eaa59dd6b87c0397ecaa29d0b4562a4b934880c
-
SHA512
311c4690325978020130c502b961b323ad80efdd4c6bf33537430f4be9b83b49fcd6f9f2bfb8f85b652c2f44f6fac935518c44016e0a908af782ae01196751ca
-
SSDEEP
1536:gWTHVn5wa8TXvqHp6kzWgDaO3C54Gf3lagvHkMTafiyVDr1lVUy3jy0:gWTHVn8TXvc4O3CFvlaSED1PZj/
Malware Config
Signatures
-
Arkei family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Mars_Stealer_cracked_by_LLCPPC.exe
Files
-
Mars_Stealer_cracked_by_LLCPPC.exe.exe windows:5 windows x86
4c665f81387442ad965e3f4eba69f083
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strstr
strncpy
getenv
rand
srand
_mbsicmp
_putenv
strtok
memcpy
memset
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
LLCPPC Size: 512B - Virtual size: 352B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE