General
-
Target
512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090
-
Size
343KB
-
Sample
211116-lctx9aaahp
-
MD5
228b5967460e6e74796a9bcd92036347
-
SHA1
ac0160e43279f84a8e9507b93d7a1097904772d6
-
SHA256
512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090
-
SHA512
b07ac5f1f3b9fef3f67fc65ba06e2083b598dcf7c13ff430edd1cc29017a25d9a0a281ac4bf4a4ae2c53ea15535ff5d36caa72a80fbc7c46374a267de9dac7f2
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090
-
Size
343KB
-
MD5
228b5967460e6e74796a9bcd92036347
-
SHA1
ac0160e43279f84a8e9507b93d7a1097904772d6
-
SHA256
512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090
-
SHA512
b07ac5f1f3b9fef3f67fc65ba06e2083b598dcf7c13ff430edd1cc29017a25d9a0a281ac4bf4a4ae2c53ea15535ff5d36caa72a80fbc7c46374a267de9dac7f2
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-