Description
Arkei is an infostealer written in C++.
2ff7f93285f2ebdc6a130f230bb6af311d38efc9657caa1a9cf3d0752dfe448c
326KB
211226-ht6ftshhar
2d7fe698ce93e28b4946baa04e66ef4b
09af2cbbca21f9cdd88b0c9f3b585396497d0018
2ff7f93285f2ebdc6a130f230bb6af311d38efc9657caa1a9cf3d0752dfe448c
3a013321de4294215635944af2d1e6d01d6ff15ecbfdc4172baafcc07fac1a32e8893df4301cf2a12d572cf322d8303a97f512ece1b5f7702c24f1c48f354134
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
2ff7f93285f2ebdc6a130f230bb6af311d38efc9657caa1a9cf3d0752dfe448c
2d7fe698ce93e28b4946baa04e66ef4b
326KB
09af2cbbca21f9cdd88b0c9f3b585396497d0018
2ff7f93285f2ebdc6a130f230bb6af311d38efc9657caa1a9cf3d0752dfe448c
3a013321de4294215635944af2d1e6d01d6ff15ecbfdc4172baafcc07fac1a32e8893df4301cf2a12d572cf322d8303a97f512ece1b5f7702c24f1c48f354134
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.