Description
Arkei is an infostealer written in C++.
4b729a7ce200df2356bfa82ad38848b001668d06509c37b302c034a4f1de0e3c
327KB
211226-m1apysaacr
4fc15e88f0b97ef146f81035915a81ff
5b420a62afb01aea28ee4072b5d1c5ad84fc012d
4b729a7ce200df2356bfa82ad38848b001668d06509c37b302c034a4f1de0e3c
b5de4e1eb74c231e4c349a47d6df3b29f6037d9955c0733ff0dc1706f98dad129bf5bdd21191c72a4c84a8866232e88913f4c21c824d18f1b359977efe65ffbe
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
4b729a7ce200df2356bfa82ad38848b001668d06509c37b302c034a4f1de0e3c
4fc15e88f0b97ef146f81035915a81ff
327KB
5b420a62afb01aea28ee4072b5d1c5ad84fc012d
4b729a7ce200df2356bfa82ad38848b001668d06509c37b302c034a4f1de0e3c
b5de4e1eb74c231e4c349a47d6df3b29f6037d9955c0733ff0dc1706f98dad129bf5bdd21191c72a4c84a8866232e88913f4c21c824d18f1b359977efe65ffbe
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.