Description
Arkei is an infostealer written in C++.
b100408d321895b3b9ae98ed665e41a70b257c807e0c9900e65f10267a48334d
277KB
211120-mlsxzscffj
92ee3bacc5bde327faa2756b4d412ca9
aa9e74090723cfbd7dcf5f95721608ca3cfb10a6
b100408d321895b3b9ae98ed665e41a70b257c807e0c9900e65f10267a48334d
8a00b6e5cabe1a50050eec15245d78dd0b6b14056d3117d6399873fc67a506582c7ebbe45accfcbd35786e476fa4cacf02b2d240cacd79473f7fb518b313a8a5
Family | smokeloader |
Version | 2020 |
C2 |
http://host-file-host6.com/ http://host-host-file8.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
quadoil.ru lakeflex.ru |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | ddf183af4241e3172885cf1b2c4c1fb4ee03d05a |
Attributes |
url4cnc http://91.219.236.27/capibar http://5.181.156.92/capibar http://91.219.236.207/capibar http://185.225.19.18/capibar http://91.219.237.227/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | redline |
C2 |
185.159.80.90:38637 |
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | 59885c564847bf29ddd9457b81c619998245ba90 |
Attributes |
url4cnc http://91.219.236.27/opussenseus1 http://5.181.156.92/opussenseus1 http://91.219.236.207/opussenseus1 http://185.225.19.18/opussenseus1 http://91.219.237.227/opussenseus1 https://t.me/opussenseus1 |
rc4.plain |
|
rc4.plain |
|
Family | redline |
Botnet | Sleeze |
C2 |
194.127.179.0:42417 |
Family | redline |
Botnet | easymoneydontshiny |
C2 |
45.153.186.153:56675 |
Family | warzonerat |
C2 |
176.113.82.95:5200 |
Family | vidar |
Version | 48.6 |
Botnet | 706 |
C2 |
https://mastodon.online/@valhalla https://koyu.space/@valhalla |
Attributes |
profile_id 706 |
b100408d321895b3b9ae98ed665e41a70b257c807e0c9900e65f10267a48334d
92ee3bacc5bde327faa2756b4d412ca9
277KB
aa9e74090723cfbd7dcf5f95721608ca3cfb10a6
b100408d321895b3b9ae98ed665e41a70b257c807e0c9900e65f10267a48334d
8a00b6e5cabe1a50050eec15245d78dd0b6b14056d3117d6399873fc67a506582c7ebbe45accfcbd35786e476fa4cacf02b2d240cacd79473f7fb518b313a8a5
Arkei is an infostealer written in C++.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.