Description
Arkei is an infostealer written in C++.
a760692dedff1b4ca14c33ef0b6a34bf64bcae3ed67e80d69e2c763bdaeed8e8
326KB
211226-j2z5fsbcg6
400d861df40d67bf2250c0822d52bb97
5fe968600bd33c05a34127e8d5768d4d21e3e9cc
a760692dedff1b4ca14c33ef0b6a34bf64bcae3ed67e80d69e2c763bdaeed8e8
e308d9748a258153e333dd6dc8984539e2e956f3d8c33dd5aadf6cf0b911242b561bb6dcf07ee54762b9f9ef1cba52ad5b65bf40a19223c84ae887a823b468b5
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
a760692dedff1b4ca14c33ef0b6a34bf64bcae3ed67e80d69e2c763bdaeed8e8
400d861df40d67bf2250c0822d52bb97
326KB
5fe968600bd33c05a34127e8d5768d4d21e3e9cc
a760692dedff1b4ca14c33ef0b6a34bf64bcae3ed67e80d69e2c763bdaeed8e8
e308d9748a258153e333dd6dc8984539e2e956f3d8c33dd5aadf6cf0b911242b561bb6dcf07ee54762b9f9ef1cba52ad5b65bf40a19223c84ae887a823b468b5
Arkei is an infostealer written in C++.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.