Description
Arkei is an infostealer written in C++.
0b23e601c279d2a0a8895a7139427c6abb366e1ba775ca18fd63ba3cb0514ed3
326KB
211226-jk1dwsbce9
51780526645b8b3903ea49e77b8f3b7d
c4c2cb67357ea068afa0095efe11d93d420fc478
0b23e601c279d2a0a8895a7139427c6abb366e1ba775ca18fd63ba3cb0514ed3
cad881efbd2ea664e5cfb0e3ae868763eb2e94fc497098ca31db42af85c85974bae9b7f7f4b9d8be1ce3a837ce9bc195b0be634a908d05fb4f19382bbc7061f2
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
0b23e601c279d2a0a8895a7139427c6abb366e1ba775ca18fd63ba3cb0514ed3
51780526645b8b3903ea49e77b8f3b7d
326KB
c4c2cb67357ea068afa0095efe11d93d420fc478
0b23e601c279d2a0a8895a7139427c6abb366e1ba775ca18fd63ba3cb0514ed3
cad881efbd2ea664e5cfb0e3ae868763eb2e94fc497098ca31db42af85c85974bae9b7f7f4b9d8be1ce3a837ce9bc195b0be634a908d05fb4f19382bbc7061f2
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.