Description
Arkei is an infostealer written in C++.
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
327KB
211226-nbr4daaadp
6d4f67848e786a5960ff5d4cd0a7b779
43f915c59a332a77819ce4c66eaa0559ea5850c4
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
f731ea25fc5f486802df27e7599dac3d2348a4cd294c6a8a227d5f4c932be3266401dd0fe4c957cbd619d7b6ebd262791e1f870f6224b226374ecd7a14e62a03
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
Family | raccoon |
Botnet | 10da56e7e71e97bdc1f36eb76813bbc3231de7e4 |
Attributes |
url4cnc http://194.180.174.53/capibar http://91.219.236.18/capibar http://194.180.174.41/capibar http://91.219.236.148/capibar https://t.me/capibar |
rc4.plain |
|
rc4.plain |
|
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
6d4f67848e786a5960ff5d4cd0a7b779
327KB
43f915c59a332a77819ce4c66eaa0559ea5850c4
fc7291f973855f25f8bd569f39d97cda140726b6e3af6ae0262d98e23f40f46f
f731ea25fc5f486802df27e7599dac3d2348a4cd294c6a8a227d5f4c932be3266401dd0fe4c957cbd619d7b6ebd262791e1f870f6224b226374ecd7a14e62a03
Arkei is an infostealer written in C++.
Simple but powerful infostealer which was very active in 2019.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.