General
-
Target
a28c021ab6a96b4658ae10315aee6e971fed592fab3b8d86e1758f4dbd310acb
-
Size
316KB
-
Sample
220114-vg9c6shcc4
-
MD5
d24a863257ba2a64259b4cad74107ad3
-
SHA1
4826470eac5fd8d58753a4f5476380650ea31c1b
-
SHA256
a28c021ab6a96b4658ae10315aee6e971fed592fab3b8d86e1758f4dbd310acb
-
SHA512
76fe8b077824948660be4bb727a3dcba2c22af3714a2b943f53975e5120b70f943bca474f07f0118a8af6894fc57c9e4b3eecae08c9024cb5d247b48c90fec95
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
a28c021ab6a96b4658ae10315aee6e971fed592fab3b8d86e1758f4dbd310acb
-
Size
316KB
-
MD5
d24a863257ba2a64259b4cad74107ad3
-
SHA1
4826470eac5fd8d58753a4f5476380650ea31c1b
-
SHA256
a28c021ab6a96b4658ae10315aee6e971fed592fab3b8d86e1758f4dbd310acb
-
SHA512
76fe8b077824948660be4bb727a3dcba2c22af3714a2b943f53975e5120b70f943bca474f07f0118a8af6894fc57c9e4b3eecae08c9024cb5d247b48c90fec95
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-