Description
Arkei is an infostealer written in C++.
06694768182079f742731e4bc2f6c0ffc012417020d04cd798cb8df4f8919f11
326KB
211226-letp9shhgn
5f2f83a0a4871261ffe7c136881e8799
4f09615b627e9019096f8b92c8293eac7c8a5fd0
06694768182079f742731e4bc2f6c0ffc012417020d04cd798cb8df4f8919f11
4c8b0ff0e79abeceb8ad533ae7f99b78045b2356aa7e0f6af30d03e3eed8beef3cd080e2505c6f979b61edc1f0ae31ed62bf705938ad9619c192ba03abd7671a
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
06694768182079f742731e4bc2f6c0ffc012417020d04cd798cb8df4f8919f11
5f2f83a0a4871261ffe7c136881e8799
326KB
4f09615b627e9019096f8b92c8293eac7c8a5fd0
06694768182079f742731e4bc2f6c0ffc012417020d04cd798cb8df4f8919f11
4c8b0ff0e79abeceb8ad533ae7f99b78045b2356aa7e0f6af30d03e3eed8beef3cd080e2505c6f979b61edc1f0ae31ed62bf705938ad9619c192ba03abd7671a
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.