General
-
Target
7f955dab9b1e5f2ba34876cfec7087e46fdbc195567adb16fef7b669616aef56
-
Size
313KB
-
Sample
220114-r8l56shagl
-
MD5
f6ab57132389678f6683ef172ebbe183
-
SHA1
a2aacef1b6a5ec099813bc1b48454b781a1d0a55
-
SHA256
7f955dab9b1e5f2ba34876cfec7087e46fdbc195567adb16fef7b669616aef56
-
SHA512
8dbcb09ed1f3d6622bdbf910363f6cfe173503216a1a3ce1685efbaa2f61c5e3ef5896af1431e5cb4304d4135158f7ddd9c85d39707899bad66df40d82620370
Static task
static1
Behavioral task
behavioral1
Sample
7f955dab9b1e5f2ba34876cfec7087e46fdbc195567adb16fef7b669616aef56.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
tofsee
patmushta.info
parubey.info
Targets
-
-
Target
7f955dab9b1e5f2ba34876cfec7087e46fdbc195567adb16fef7b669616aef56
-
Size
313KB
-
MD5
f6ab57132389678f6683ef172ebbe183
-
SHA1
a2aacef1b6a5ec099813bc1b48454b781a1d0a55
-
SHA256
7f955dab9b1e5f2ba34876cfec7087e46fdbc195567adb16fef7b669616aef56
-
SHA512
8dbcb09ed1f3d6622bdbf910363f6cfe173503216a1a3ce1685efbaa2f61c5e3ef5896af1431e5cb4304d4135158f7ddd9c85d39707899bad66df40d82620370
-
Arkei Stealer Payload
-
Creates new service(s)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-