Description
Arkei is an infostealer written in C++.
c41ecbb533f6da059e2996cc5065805d2038ba4d0e670d57939b30b109bd6eba
320KB
211120-s6k1rsdaal
83b62ccce9d742a53e5fe0016fab9ded
4ec481fc61cb5fa86296975000c25e0eec7376b9
c41ecbb533f6da059e2996cc5065805d2038ba4d0e670d57939b30b109bd6eba
5116417b66769ee983a2b27ad611b1488e7643e6189fc4c2322a76658ecd6c70edc557faf5021a366cc135e96f4014ba25486f486fd203437d9f123e449714a4
Family | smokeloader |
Version | 2020 |
C2 |
http://host-file-host6.com/ http://host-host-file8.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
quadoil.ru lakeflex.ru |
Family | redline |
C2 |
185.159.80.90:38637 |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | ddf183af4241e3172885cf1b2c4c1fb4ee03d05a |
Attributes |
url4cnc http://91.219.236.27/capibar http://5.181.156.92/capibar http://91.219.236.207/capibar http://185.225.19.18/capibar http://91.219.237.227/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | raccoon |
Version | 1.8.3-hotfix |
Botnet | 59885c564847bf29ddd9457b81c619998245ba90 |
Attributes |
url4cnc http://91.219.236.27/opussenseus1 http://5.181.156.92/opussenseus1 http://91.219.236.207/opussenseus1 http://185.225.19.18/opussenseus1 http://91.219.237.227/opussenseus1 https://t.me/opussenseus1 |
rc4.plain |
|
rc4.plain |
|
Family | redline |
Botnet | Sleeze |
C2 |
194.127.179.0:42417 |
Family | vidar |
Version | 48.6 |
Botnet | 706 |
C2 |
https://mastodon.online/@valhalla https://koyu.space/@valhalla |
Attributes |
profile_id 706 |
Family | redline |
Botnet | easymoneydontshiny |
C2 |
45.153.186.153:56675 |
c41ecbb533f6da059e2996cc5065805d2038ba4d0e670d57939b30b109bd6eba
83b62ccce9d742a53e5fe0016fab9ded
320KB
4ec481fc61cb5fa86296975000c25e0eec7376b9
c41ecbb533f6da059e2996cc5065805d2038ba4d0e670d57939b30b109bd6eba
5116417b66769ee983a2b27ad611b1488e7643e6189fc4c2322a76658ecd6c70edc557faf5021a366cc135e96f4014ba25486f486fd203437d9f123e449714a4
Arkei is an infostealer written in C++.
This typically indicates the parent process was compromised via an exploit or macro.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE DCRAT Activity (GET)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.