General
-
Target
d2062943188f5bd794142fb18960d82154d8a128d381ef5b5165850fe5e82079
-
Size
313KB
-
Sample
220114-hfz2wsege2
-
MD5
9a3b9f702e0f048b46f464609fc386ca
-
SHA1
126234cfedec14c49d67880def7325c8d2824dc0
-
SHA256
d2062943188f5bd794142fb18960d82154d8a128d381ef5b5165850fe5e82079
-
SHA512
42a80b805bcb6a3db21f87e34552cc22b0d150345af15d431c5dc95860d9f7298a4815a4d3416e51c4db57040146bb9fb1875cba81771fd789ffaf0943b24d2d
Static task
static1
Behavioral task
behavioral1
Sample
d2062943188f5bd794142fb18960d82154d8a128d381ef5b5165850fe5e82079.exe
Resource
win10-en-20211208
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
amadey
3.01
185.215.113.35/d2VxjasuwS/index.php
Targets
-
-
Target
d2062943188f5bd794142fb18960d82154d8a128d381ef5b5165850fe5e82079
-
Size
313KB
-
MD5
9a3b9f702e0f048b46f464609fc386ca
-
SHA1
126234cfedec14c49d67880def7325c8d2824dc0
-
SHA256
d2062943188f5bd794142fb18960d82154d8a128d381ef5b5165850fe5e82079
-
SHA512
42a80b805bcb6a3db21f87e34552cc22b0d150345af15d431c5dc95860d9f7298a4815a4d3416e51c4db57040146bb9fb1875cba81771fd789ffaf0943b24d2d
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-