General

  • Target

    1f3200b3a27d38457255512626ec9234a124522fa8383afc09cb52743c15fee6

  • Size

    197KB

  • Sample

    210915-gqechachdr

  • MD5

    44d02d116682d4ca4c37c543f298099d

  • SHA1

    dfbb378b660facf964cea96ad6694ce2c9b3248d

  • SHA256

    1f3200b3a27d38457255512626ec9234a124522fa8383afc09cb52743c15fee6

  • SHA512

    25da1db574974ec7ea0d9b2cd1c5dcdcd17ec319809ab74c739dc5afdfcfe07917bcb37ef28e35c3b7530a1b86f61c9d6f836d69f484ffb81de09f99034ca4a3

Score
10/10

Malware Config

Targets

    • Target

      1f3200b3a27d38457255512626ec9234a124522fa8383afc09cb52743c15fee6

    • Size

      197KB

    • MD5

      44d02d116682d4ca4c37c543f298099d

    • SHA1

      dfbb378b660facf964cea96ad6694ce2c9b3248d

    • SHA256

      1f3200b3a27d38457255512626ec9234a124522fa8383afc09cb52743c15fee6

    • SHA512

      25da1db574974ec7ea0d9b2cd1c5dcdcd17ec319809ab74c739dc5afdfcfe07917bcb37ef28e35c3b7530a1b86f61c9d6f836d69f484ffb81de09f99034ca4a3

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks