General
-
Target
aec70ded586cfe6f9bae06560b0fe7a6
-
Size
989KB
-
Sample
220110-pt27qseeeq
-
MD5
aec70ded586cfe6f9bae06560b0fe7a6
-
SHA1
8da695d69d3e3c3df85767b57c24f46576d1aeef
-
SHA256
a1d583650ec7dc99e6c0c4009908358518a0be5fbe7cb6e2b3a50889bb5da3a1
-
SHA512
14a2f13cb24652d0e3d230d5c05a90d9312ea26a7dacd81de9482fa87d7dab9b718c6af6be28ca7e747da156f136193b328cff662cd50d5f7fb8e684ead0edec
Static task
static1
Behavioral task
behavioral1
Sample
aec70ded586cfe6f9bae06560b0fe7a6.exe
Resource
win7-en-20211208
Malware Config
Extracted
arkei
Default
http://185.7.214.239/POeNDXYchB.php
Targets
-
-
Target
aec70ded586cfe6f9bae06560b0fe7a6
-
Size
989KB
-
MD5
aec70ded586cfe6f9bae06560b0fe7a6
-
SHA1
8da695d69d3e3c3df85767b57c24f46576d1aeef
-
SHA256
a1d583650ec7dc99e6c0c4009908358518a0be5fbe7cb6e2b3a50889bb5da3a1
-
SHA512
14a2f13cb24652d0e3d230d5c05a90d9312ea26a7dacd81de9482fa87d7dab9b718c6af6be28ca7e747da156f136193b328cff662cd50d5f7fb8e684ead0edec
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-