Description
Arkei is an infostealer written in C++.
f4b138048439bf5ab9ebc72556a0f0418fc80b01775fc197bad44cf4e84c5930
326KB
211226-g42d7abcb8
3f935166c6e7cd181c2ad913de8fda2d
31a4961e071b0bee5ed8ba46ee40b9ffbc2cd969
f4b138048439bf5ab9ebc72556a0f0418fc80b01775fc197bad44cf4e84c5930
ea6a9c7b967a8b3583aa77a20200f02d1e560fcb6ae983ba6365e9fcc614af68a01d1d18b15a92105f041d8941926dbea553b6e43379a3192efb9bba82cbc84b
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
f4b138048439bf5ab9ebc72556a0f0418fc80b01775fc197bad44cf4e84c5930
3f935166c6e7cd181c2ad913de8fda2d
326KB
31a4961e071b0bee5ed8ba46ee40b9ffbc2cd969
f4b138048439bf5ab9ebc72556a0f0418fc80b01775fc197bad44cf4e84c5930
ea6a9c7b967a8b3583aa77a20200f02d1e560fcb6ae983ba6365e9fcc614af68a01d1d18b15a92105f041d8941926dbea553b6e43379a3192efb9bba82cbc84b
Arkei is an infostealer written in C++.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.