General
-
Target
eb6fb505e92bf049294b75bd541b3fd572521bcc3eae5393b0b89290e3504ad8
-
Size
343KB
-
Sample
211116-mry17adce2
-
MD5
fe8b30e756e7519fcdcfd6281dc4c2c6
-
SHA1
fc216549bfb23f949a29233ebefaab409f02b8ca
-
SHA256
eb6fb505e92bf049294b75bd541b3fd572521bcc3eae5393b0b89290e3504ad8
-
SHA512
4f64572122da3f885cdf74df2a3fcf159373ac2f5b39148b11dd0eaf6822c7be675c498af103ac9d222af32fe30fe387eb689d07f5ed03cfc53a9fe6e1cb5fcd
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
eb6fb505e92bf049294b75bd541b3fd572521bcc3eae5393b0b89290e3504ad8
-
Size
343KB
-
MD5
fe8b30e756e7519fcdcfd6281dc4c2c6
-
SHA1
fc216549bfb23f949a29233ebefaab409f02b8ca
-
SHA256
eb6fb505e92bf049294b75bd541b3fd572521bcc3eae5393b0b89290e3504ad8
-
SHA512
4f64572122da3f885cdf74df2a3fcf159373ac2f5b39148b11dd0eaf6822c7be675c498af103ac9d222af32fe30fe387eb689d07f5ed03cfc53a9fe6e1cb5fcd
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-