Description
Arkei is an infostealer written in C++.
6540d525cae788a13a66d8fb84b0760d43e39e3ec2de5199dd418b2deb703731
326KB
211226-fzbgjabbh2
fe949c372e2b28e4f8b1edeab25c021e
c74f381a5b71ab90b1653c64d98500836d4fb9bb
6540d525cae788a13a66d8fb84b0760d43e39e3ec2de5199dd418b2deb703731
6403afc3319238221bf2c07e91fdb4e921074ee3a12ad3b4c894a1fc6e95b1f041ad4ba876d2013e7df08bfb9eb584f7ed798da9d3cb682c99747018b4c5d587
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
6540d525cae788a13a66d8fb84b0760d43e39e3ec2de5199dd418b2deb703731
fe949c372e2b28e4f8b1edeab25c021e
326KB
c74f381a5b71ab90b1653c64d98500836d4fb9bb
6540d525cae788a13a66d8fb84b0760d43e39e3ec2de5199dd418b2deb703731
6403afc3319238221bf2c07e91fdb4e921074ee3a12ad3b4c894a1fc6e95b1f041ad4ba876d2013e7df08bfb9eb584f7ed798da9d3cb682c99747018b4c5d587
Arkei is an infostealer written in C++.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Modifies file attributes to stop it showing in Explorer etc.
Detects executables packed with UPX/modified UPX open source packer.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.