54cada1b9db82b02330bb5b912993fcb.exe

General
Target

54cada1b9db82b02330bb5b912993fcb.exe

Size

190KB

Sample

211125-vdd3vsbbg3

Score
10 /10
MD5

54cada1b9db82b02330bb5b912993fcb

SHA1

c3b3dcb9ef275c3f2e2f8cec28d4440df6c746b0

SHA256

3cca77d790fbff02b5671b017a33b127bcff121040b7289d7a310974fc4f3378

SHA512

d8b2e569590e50a52327a2e770c9b17e013e1ce297142dd81f71b1dd09b5fde97e7379518db6b3aa12ee1ebe06ee8672c52516899fc2f729f2b90660cba084b0

Malware Config

Extracted

Family arkei
Botnet Default
C2

http://die-grausamste-herrin.at/wp.php

Targets
Target

54cada1b9db82b02330bb5b912993fcb.exe

MD5

54cada1b9db82b02330bb5b912993fcb

Filesize

190KB

Score
10 /10
SHA1

c3b3dcb9ef275c3f2e2f8cec28d4440df6c746b0

SHA256

3cca77d790fbff02b5671b017a33b127bcff121040b7289d7a310974fc4f3378

SHA512

d8b2e569590e50a52327a2e770c9b17e013e1ce297142dd81f71b1dd09b5fde97e7379518db6b3aa12ee1ebe06ee8672c52516899fc2f729f2b90660cba084b0

Tags

Signatures

  • Arkei

    Description

    Arkei is an infostealer written in C++.

    Tags

  • Arkei Stealer Payload

    Tags

  • Downloads MZ/PE file

  • Deletes itself

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1