Description
Arkei is an infostealer written in C++.
14bf8d4e3f7154cdc0f6cc99b1ac2f6504cdbcb72d8e5a86d175bdf12eb84e3f
327KB
211226-mp3atsaacl
b92071a0dd98028f94bb91107cd3207c
c38e2e4e978b447022ad194a97f4961b35a25794
14bf8d4e3f7154cdc0f6cc99b1ac2f6504cdbcb72d8e5a86d175bdf12eb84e3f
5d48faff2a610c83534668da4447de8ecaa174bb575fb06fe3e0e4381d668a4acecd17ec912ffc07259e5dfe4c28125627a3479fd6cb274b19771d72b460eb8b
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
14bf8d4e3f7154cdc0f6cc99b1ac2f6504cdbcb72d8e5a86d175bdf12eb84e3f
b92071a0dd98028f94bb91107cd3207c
327KB
c38e2e4e978b447022ad194a97f4961b35a25794
14bf8d4e3f7154cdc0f6cc99b1ac2f6504cdbcb72d8e5a86d175bdf12eb84e3f
5d48faff2a610c83534668da4447de8ecaa174bb575fb06fe3e0e4381d668a4acecd17ec912ffc07259e5dfe4c28125627a3479fd6cb274b19771d72b460eb8b
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.