Description
Arkei is an infostealer written in C++.
9a60ffe0827afc57455926459836281f.exe
312KB
211117-e8y4hsebem
9a60ffe0827afc57455926459836281f
c3a6616342f845659f35de8db3c3f7038acd06fa
bb1944681aa2fcfd5f372fd44e041a63569b46130540225afc1560a1650d4e37
a4a744d3fbf8ee8a4ba20e909e530f0085988f9fd01940775370f2e9180929c6a84a08586a93ea51a2d161f41db3a4159f9e01da23bba72f2509cdd6c8917365
Family | socelars |
C2 |
http://www.gianninidesign.com/ |
Family | redline |
Botnet | udptest |
C2 |
193.56.146.64:65441 |
Family | redline |
Botnet | luna2121 |
C2 |
135.181.129.119:4805 |
Family | vidar |
Version | 48.5 |
Botnet | 937 |
C2 |
https://koyu.space/@tttaj |
Attributes |
profile_id 937 |
Family | metasploit |
Version | windows/single_exec |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | ddf183af4241e3172885cf1b2c4c1fb4ee03d05a |
Attributes |
url4cnc http://91.219.236.27/capibar http://5.181.156.92/capibar http://91.219.236.207/capibar http://185.225.19.18/capibar http://91.219.237.227/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
9a60ffe0827afc57455926459836281f.exe
9a60ffe0827afc57455926459836281f
312KB
c3a6616342f845659f35de8db3c3f7038acd06fa
bb1944681aa2fcfd5f372fd44e041a63569b46130540225afc1560a1650d4e37
a4a744d3fbf8ee8a4ba20e909e530f0085988f9fd01940775370f2e9180929c6a84a08586a93ea51a2d161f41db3a4159f9e01da23bba72f2509cdd6c8917365
Arkei is an infostealer written in C++.
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Socelars is an infostealer targeting browser cookies and credit card credentials.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Detects Themida, an advanced Windows software protection system.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.
Uses a legitimate geolocation service to find the infected system's geolocation info.