Description
Arkei is an infostealer written in C++.
f83b13bd00df1c0573b4d77ed6725cd847054642772f281763ddbf8aa247431d
326KB
211226-g8ar2abcc2
9a0752adde3e3ebf70fd91d54a79d0fe
1c94c85e7697e1f6e6765c623b230b51b318a1f0
f83b13bd00df1c0573b4d77ed6725cd847054642772f281763ddbf8aa247431d
af1eafd022ec50ed3916a373565c2e1d702063372ff9d19bb10ea9ba32f1b1c34114690c9e2aaa21f0afa2f92a9ac7067fe8a579ecd7fa1ebc772f7a8cc0d043
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
f83b13bd00df1c0573b4d77ed6725cd847054642772f281763ddbf8aa247431d
9a0752adde3e3ebf70fd91d54a79d0fe
326KB
1c94c85e7697e1f6e6765c623b230b51b318a1f0
f83b13bd00df1c0573b4d77ed6725cd847054642772f281763ddbf8aa247431d
af1eafd022ec50ed3916a373565c2e1d702063372ff9d19bb10ea9ba32f1b1c34114690c9e2aaa21f0afa2f92a9ac7067fe8a579ecd7fa1ebc772f7a8cc0d043
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.