Description
Arkei is an infostealer written in C++.
2a0ecd6047ac3e929413c9dc65fd9550.exe
278KB
211120-lyc7macfcp
2a0ecd6047ac3e929413c9dc65fd9550
cab43b6a7d163a16b052bde9ad9392fa7fe1809e
77a56e7215c37931be8cb84232306667ec719336e2ae38fb75ed30bc39c303b9
03ea28406bc08b13d283bbe8510d52ef8ddf5d5773038805c77b24d52fd61d745cd21739fb9780559845a47b9746f8a19b4c1a19d6a470f93dfabcc85c681f96
Family | smokeloader |
Version | 2020 |
C2 |
http://host-file-host6.com/ http://host-host-file8.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
quadoil.ru lakeflex.ru |
Family | redline |
C2 |
185.159.80.90:38637 |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | ddf183af4241e3172885cf1b2c4c1fb4ee03d05a |
Attributes |
url4cnc http://91.219.236.27/capibar http://5.181.156.92/capibar http://91.219.236.207/capibar http://185.225.19.18/capibar http://91.219.237.227/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | 59885c564847bf29ddd9457b81c619998245ba90 |
Attributes |
url4cnc http://91.219.236.27/opussenseus1 http://5.181.156.92/opussenseus1 http://91.219.236.207/opussenseus1 http://185.225.19.18/opussenseus1 http://91.219.237.227/opussenseus1 https://t.me/opussenseus1 |
rc4.plain |
|
rc4.plain |
|
Family | redline |
Botnet | easymoneydontshiny |
C2 |
45.153.186.153:56675 |
Family | vidar |
Version | 48.6 |
Botnet | 706 |
C2 |
https://mastodon.online/@valhalla https://koyu.space/@valhalla |
Attributes |
profile_id 706 |
2a0ecd6047ac3e929413c9dc65fd9550.exe
2a0ecd6047ac3e929413c9dc65fd9550
278KB
cab43b6a7d163a16b052bde9ad9392fa7fe1809e
77a56e7215c37931be8cb84232306667ec719336e2ae38fb75ed30bc39c303b9
03ea28406bc08b13d283bbe8510d52ef8ddf5d5773038805c77b24d52fd61d745cd21739fb9780559845a47b9746f8a19b4c1a19d6a470f93dfabcc85c681f96
Arkei is an infostealer written in C++.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Detects Themida, an advanced Windows software protection system.
Looks up Uninstall key entries in the registry to enumerate software on the system.