General

  • Target

    512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090

  • Size

    343KB

  • Sample

    211116-lctx9aaahp

  • MD5

    228b5967460e6e74796a9bcd92036347

  • SHA1

    ac0160e43279f84a8e9507b93d7a1097904772d6

  • SHA256

    512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090

  • SHA512

    b07ac5f1f3b9fef3f67fc65ba06e2083b598dcf7c13ff430edd1cc29017a25d9a0a281ac4bf4a4ae2c53ea15535ff5d36caa72a80fbc7c46374a267de9dac7f2

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090

    • Size

      343KB

    • MD5

      228b5967460e6e74796a9bcd92036347

    • SHA1

      ac0160e43279f84a8e9507b93d7a1097904772d6

    • SHA256

      512dc0eb39c47b1318bee3c92b450f35e66c8bdfd32035c696babdcb2001f090

    • SHA512

      b07ac5f1f3b9fef3f67fc65ba06e2083b598dcf7c13ff430edd1cc29017a25d9a0a281ac4bf4a4ae2c53ea15535ff5d36caa72a80fbc7c46374a267de9dac7f2

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.