Description
Arkei is an infostealer written in C++.
f3b976b7cf9758297025bc90bcfb1660f7aba849b4934b6df0c6b35d758f30c6
327KB
211226-nyaslsbeb5
d1b4cc256d963f6549b9d63fd63c3bb7
75a65405f5dc3c864913e919fa35adc21045dabb
f3b976b7cf9758297025bc90bcfb1660f7aba849b4934b6df0c6b35d758f30c6
bb1f7f2c9c3765f990de039298fe745415c4546d664a892044799c6a6825a1dc259e6ffb519fb0cc8bc4d5ba9fcc921a14dea0e0e31c69edae77138e464ecc7f
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | tofsee |
C2 |
parubey.info patmushta.info |
Family | redline |
Botnet | 1 |
C2 |
86.107.197.138:38133 |
f3b976b7cf9758297025bc90bcfb1660f7aba849b4934b6df0c6b35d758f30c6
d1b4cc256d963f6549b9d63fd63c3bb7
327KB
75a65405f5dc3c864913e919fa35adc21045dabb
f3b976b7cf9758297025bc90bcfb1660f7aba849b4934b6df0c6b35d758f30c6
bb1f7f2c9c3765f990de039298fe745415c4546d664a892044799c6a6825a1dc259e6ffb519fb0cc8bc4d5ba9fcc921a14dea0e0e31c69edae77138e464ecc7f
Arkei is an infostealer written in C++.
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.