Description
Arkei is an infostealer written in C++.
22e6c33b3ad392f4d502e7afb7641214afa4a838a076116b5352b9b62ae84ec7
327KB
211226-gpwkdsbcb3
f7a15cb0397ec57c3ef52f6b9b597ece
3539fc1b9122fd50ff71dc55146e3a7d4281fb8d
22e6c33b3ad392f4d502e7afb7641214afa4a838a076116b5352b9b62ae84ec7
a2bb424454e852a8a93152ddf69c0c33c73efd96b82c555c638d25e03b482c960223ae4497b56c1ca64a868ed80b372e352c243dd4347a861c200114d372d8af
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
22e6c33b3ad392f4d502e7afb7641214afa4a838a076116b5352b9b62ae84ec7
f7a15cb0397ec57c3ef52f6b9b597ece
327KB
3539fc1b9122fd50ff71dc55146e3a7d4281fb8d
22e6c33b3ad392f4d502e7afb7641214afa4a838a076116b5352b9b62ae84ec7
a2bb424454e852a8a93152ddf69c0c33c73efd96b82c555c638d25e03b482c960223ae4497b56c1ca64a868ed80b372e352c243dd4347a861c200114d372d8af
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.