General

  • Target

    mixshop_20220103-042030

  • Size

    347KB

  • Sample

    220103-lnnwdahfan

  • MD5

    b74674e1f9d7c00f97d8ab0688fbe6dd

  • SHA1

    b700d7098f670b4e71a6e4985bda422683e7faac

  • SHA256

    d7663038ffb23e071ff0f076f9d949685615400af2eefa25b30f9e79cd878671

  • SHA512

    fb8088182af255491c060b87e200400ca7368eb824604f81da35eaee7dad5679011de259d75b95a6092da93640ad901c0d8227d1edcbf76d33e42b6e221c4408

Malware Config

Extracted

Family

arkei

Botnet

homesteadr

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      mixshop_20220103-042030

    • Size

      347KB

    • MD5

      b74674e1f9d7c00f97d8ab0688fbe6dd

    • SHA1

      b700d7098f670b4e71a6e4985bda422683e7faac

    • SHA256

      d7663038ffb23e071ff0f076f9d949685615400af2eefa25b30f9e79cd878671

    • SHA512

      fb8088182af255491c060b87e200400ca7368eb824604f81da35eaee7dad5679011de259d75b95a6092da93640ad901c0d8227d1edcbf76d33e42b6e221c4408

    • Arkei

      Arkei is an infostealer written in C++.

    • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

      suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks