Description
Arkei is an infostealer written in C++.
4df70b2b3892dbcd4630248e67ee08c7132e30130ea15c0a8464c6e3f8593ad4
327KB
211226-j3ha2abcg7
bfc9b8f2b2f60b12b11fb07dbaf44bb5
5a73a3d3b23bc0a21385983cd780eeca363d8e67
4df70b2b3892dbcd4630248e67ee08c7132e30130ea15c0a8464c6e3f8593ad4
fbfeed2cd24342891bdd9df17f364ea10e5a270ba0a9f5d2ac8df28796cddc187c51619508571e235faac8d0c8961d32b33e666e599be51fdbf2d48f05de7c00
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
4df70b2b3892dbcd4630248e67ee08c7132e30130ea15c0a8464c6e3f8593ad4
bfc9b8f2b2f60b12b11fb07dbaf44bb5
327KB
5a73a3d3b23bc0a21385983cd780eeca363d8e67
4df70b2b3892dbcd4630248e67ee08c7132e30130ea15c0a8464c6e3f8593ad4
fbfeed2cd24342891bdd9df17f364ea10e5a270ba0a9f5d2ac8df28796cddc187c51619508571e235faac8d0c8961d32b33e666e599be51fdbf2d48f05de7c00
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.