Description
Arkei is an infostealer written in C++.
5ae571c619b6be1b6a9fc63705b19294.exe
729KB
211107-z1k7xabab5
5ae571c619b6be1b6a9fc63705b19294
8708d598eac5c2335abd694c36125d9ecb1721c8
bbe027ad6e46b8f314a4f40a6dfd337e2dafc9abc3627e7d04db0d73a6c4b6c9
72b86976787f8c008225f1df625b363cad84ff8c53d59a18363d1c0b147d2bc36e0e84df8e9d506d30e302f3348536910b992d6eed50cab96d4776b0c499fc94
Family | socelars |
C2 |
http://www.hhgenice.top/ |
Family | redline |
C2 |
45.9.20.149:10844 |
Family | vidar |
Version | 47.9 |
Botnet | 933 |
C2 |
https://mas.to/@kirpich |
Attributes |
profile_id 933 |
Family | vidar |
Version | 47.9 |
Botnet | 937 |
C2 |
https://mas.to/@kirpich |
Attributes |
profile_id 937 |
Family | metasploit |
Version | windows/single_exec |
Family | smokeloader |
Version | 2020 |
C2 |
http://misha.at/upload/ http://roohaniinfra.com/upload/ http://0axqpcc.cn/upload/ http://mayak-lombard.ru/upload/ http://mebel-lass.ru/upload/ http://dishakhan.com/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | redline |
Botnet | udptest |
C2 |
193.56.146.64:65441 |
5ae571c619b6be1b6a9fc63705b19294.exe
5ae571c619b6be1b6a9fc63705b19294
729KB
8708d598eac5c2335abd694c36125d9ecb1721c8
bbe027ad6e46b8f314a4f40a6dfd337e2dafc9abc3627e7d04db0d73a6c4b6c9
72b86976787f8c008225f1df625b363cad84ff8c53d59a18363d1c0b147d2bc36e0e84df8e9d506d30e302f3348536910b992d6eed50cab96d4776b0c499fc94
Arkei is an infostealer written in C++.
Gozi ISFB is a well-known and widely distributed banking trojan.
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
This typically indicates the parent process was compromised via an exploit or macro.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
Detects executables packed with VMProtect commercial packer.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Detects Themida, an advanced Windows software protection system.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.
Uses a legitimate geolocation service to find the infected system's geolocation info.