D:\VS2022\ArkaStealerApp\ArkaStealerApp\bin\Release\net8.0\win-x64\native\ArkaStealerApp.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ArkaStealerApp.exe
Resource
win10v2004-20240802-en
General
-
Target
ArkaStealerApp.exe
-
Size
1.2MB
-
MD5
563eacd9f30320c6c798221ba402491e
-
SHA1
993b2f7f5f039087c3b9ff41a58d2dfdcb044210
-
SHA256
142cd4b82a6106a2406c3ce4026b41281e098bae23f36afc426ad1e7f2c8cf67
-
SHA512
25d20bbba86aeb861be9cf4c3c68d51e32bfc15d7c59dbae8dc4fea6832dddf718a63b0bba02fa80448e914047c0102042d7e2536d0d8954d705036066a58b0a
-
SSDEEP
24576:VeS0kZVNGAIns9b21UrKmcIPAyeS4Xe1n3Iv:Ve2ZVNGA+e1n4v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ArkaStealerApp.exe
Files
-
ArkaStealerApp.exe.exe windows:6 windows x64 arch:x64
cad77180028088bf0888577300596b9b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
advapi32
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
bcrypt
BCryptGenRandom
kernel32
FreeLibrary
TlsFree
SetLastError
GetConsoleMode
GetLastError
GetFileType
ReadConsoleInputW
WriteFile
WriteConsoleW
GetConsoleOutputCP
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
GetDriveTypeW
GetVolumeInformationW
GetLogicalDrives
GetDiskFreeSpaceExW
SetThreadErrorMode
RaiseFailFastException
GetTickCount64
GetCurrentProcess
GetCurrentThread
Sleep
DeleteCriticalSection
LocalFree
EnterCriticalSection
SleepConditionVariableCS
LeaveCriticalSection
WakeConditionVariable
QueryPerformanceCounter
InitializeCriticalSection
InitializeConditionVariable
WaitForMultipleObjectsEx
QueryPerformanceFrequency
GetFullPathNameW
GetLongPathNameW
LocalAlloc
FindClose
FindFirstFileExW
GetFileAttributesExW
DuplicateHandle
GetThreadPriority
GetCurrentProcessorNumberEx
CloseHandle
SetEvent
CreateEventExW
GetEnvironmentVariableW
FormatMessageW
FlushProcessWriteBuffers
WaitForSingleObjectEx
RtlVirtualUnwind
RtlCaptureContext
RtlRestoreContext
AddVectoredExceptionHandler
FlsAlloc
FlsGetValue
FlsSetValue
CreateEventW
TerminateProcess
SwitchToThread
CreateThread
GetCurrentThreadId
SetThreadPriority
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
FlushInstructionCache
VirtualAlloc
VirtualProtect
VirtualFree
QueryInformationJobObject
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
LoadLibraryExW
GetProcessAffinityMask
InitializeContext
GetEnabledXStateFeatures
SetXStateFeaturesMask
InitializeCriticalSectionEx
VirtualQuery
GetSystemTimeAsFileTime
ResetEvent
DebugBreak
WaitForSingleObject
SleepEx
GlobalMemoryStatusEx
GetSystemInfo
GetLogicalProcessorInformation
GetLogicalProcessorInformationEx
GetLargePageMinimum
VirtualUnlock
VirtualAllocExNuma
IsProcessInJob
GetNumaHighestNodeNumber
GetProcessGroupAffinity
K32GetProcessMemoryInfo
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
EncodePointer
RaiseException
RtlPcToFileHeader
RtlUnwindEx
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlLookupFunctionEntry
InitializeSListHead
GetCurrentProcessId
ole32
CoUninitialize
CoWaitForMultipleHandles
CoGetApartmentType
CoInitializeEx
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-string-l1-1-0
_stricmp
wcsncmp
strcpy_s
strcmp
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
_set_app_type
abort
_configure_wide_argv
_initialize_wide_environment
_get_initial_wide_environment
_initterm
_initterm_e
exit
_exit
terminate
__p___argc
__p___wargv
_cexit
_c_exit
_register_thread_local_exe_atexit_callback
_crt_atexit
_initialize_onexit_table
_register_onexit_function
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
calloc
free
_callnewh
malloc
_set_new_mode
Exports
Exports
DotNetRuntimeDebugHeader
Sections
.text Size: 402KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.managed Size: 387KB - Virtual size: 387KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
hydrated Size: - Virtual size: 195KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 389KB - Virtual size: 388KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ