Description
Arkei is an infostealer written in C++.
98b05bb9bf1da4635913b4f2eb6c7e48f48d6efc71e3c791232be8536c3380ce
326KB
211226-mngbzabdg6
9a1b1fb775811208855aa0a6f4da0be8
3563788cc7ac17fb3dff6401deb96f37a2411b2b
98b05bb9bf1da4635913b4f2eb6c7e48f48d6efc71e3c791232be8536c3380ce
a930e2453302724ebb878124e5854cc6c6d81e8a99c77f0fdc3d2377eb199007561f502f4990424b8e2d3b81160fca325fc4b7cace8e220396c0169120dbe135
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
98b05bb9bf1da4635913b4f2eb6c7e48f48d6efc71e3c791232be8536c3380ce
9a1b1fb775811208855aa0a6f4da0be8
326KB
3563788cc7ac17fb3dff6401deb96f37a2411b2b
98b05bb9bf1da4635913b4f2eb6c7e48f48d6efc71e3c791232be8536c3380ce
a930e2453302724ebb878124e5854cc6c6d81e8a99c77f0fdc3d2377eb199007561f502f4990424b8e2d3b81160fca325fc4b7cace8e220396c0169120dbe135
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.