Description
Arkei is an infostealer written in C++.
a18fc388ef9b546a7f62f0364be43ec3558176c210093ac5eeabe54237851134
326KB
211226-gw3maahggk
0cb14d34f01e028d9a2b1d4e082c22c7
b251400f11b228ebfe9c8fd2888bccb34601be6a
a18fc388ef9b546a7f62f0364be43ec3558176c210093ac5eeabe54237851134
9438edca1dd81da506f6e9bd52ab90c8e34b9f185e327eca4477c9280f84ee3af7111306d0c633919d7ee36cda725dee2e5c03603b92ccc59980aa87d85d1549
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
a18fc388ef9b546a7f62f0364be43ec3558176c210093ac5eeabe54237851134
0cb14d34f01e028d9a2b1d4e082c22c7
326KB
b251400f11b228ebfe9c8fd2888bccb34601be6a
a18fc388ef9b546a7f62f0364be43ec3558176c210093ac5eeabe54237851134
9438edca1dd81da506f6e9bd52ab90c8e34b9f185e327eca4477c9280f84ee3af7111306d0c633919d7ee36cda725dee2e5c03603b92ccc59980aa87d85d1549
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.