Description
Arkei is an infostealer written in C++.
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66.zip
159KB
211115-s4xxjsfgbr
346437a8bad32a31ed7d92f62a7d4bd9
9b1e109c549f689ea723870d84506af88f578637
44ffacde234b08a135e3f8887bcb61bc3101c83849b31ecb4fd6002901f7e2a1
b0b171cbce38b18d637501222a4267929ff0f74cc13b11886104e46d50aa11bee877fd6eaa23213c4b820d9ae698eb8a41aeb8c85e636de85d75cd4e07045a4d
Family | socelars |
C2 |
http://www.gianninidesign.com/ |
Family | redline |
Botnet | udptest |
C2 |
193.56.146.64:65441 |
Family | smokeloader |
Version | 2020 |
C2 |
http://membro.at/upload/ http://jeevanpunetha.com/upload/ http://misipu.cn/upload/ http://zavodooo.ru/upload/ http://targiko.ru/upload/ http://vues3d.com/upload/ |
rc4.i32 |
|
rc4.i32 |
|
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | ddf183af4241e3172885cf1b2c4c1fb4ee03d05a |
Attributes |
url4cnc http://91.219.236.27/capibar http://5.181.156.92/capibar http://91.219.236.207/capibar http://185.225.19.18/capibar http://91.219.237.227/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | metasploit |
Version | windows/single_exec |
Family | vidar |
Version | 48.5 |
Botnet | 937 |
C2 |
https://koyu.space/@tttaj |
Attributes |
profile_id 937 |
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66
f957e397e71010885b67f2afe37d8161
403KB
a8bf84b971b37ac6e7f66c5e5a7e971a7741401e
022e3c30a1504fde93e24b2206f804a923ee9785e4db81a166939a1e7b928b66
8b5e9cb926fafc295c403c1fce7aa883db3a327e58c3295e9a081a8937bed28e305cca08c2c7d98080818095ea99bb4047e10aa2f61e3e4d6d965aef6d16a4f6
Arkei is an infostealer written in C++.
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Detects Themida, an advanced Windows software protection system.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Attempts to read the root path of hard drives other than the default C: drive.
Uses a legitimate IP lookup service to find the infected system's external IP.
Uses a legitimate geolocation service to find the infected system's geolocation info.