General

  • Target

    mixshop_20220114-202426

  • Size

    317KB

  • Sample

    220114-x4z45aadep

  • MD5

    b7d49e61090c585c799b75db9172ce44

  • SHA1

    3b29dc005f66c645bcc0fe2b8433d5a5c9308cc0

  • SHA256

    91bdad9e497d97f68d266bcb5ec8fe56d35312ce480be21795843b1aadcd9890

  • SHA512

    55b90bdd2e2be90b06accebd0a6b20465d8a201f339bf2f76439e290dbd3b577b791d29165b9a7eb5faa95cd634ed3b84bcfc18aa3eacce1d33b3ecfaad5333c

Malware Config

Extracted

Family

arkei

Botnet

homesteadr

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      mixshop_20220114-202426

    • Size

      317KB

    • MD5

      b7d49e61090c585c799b75db9172ce44

    • SHA1

      3b29dc005f66c645bcc0fe2b8433d5a5c9308cc0

    • SHA256

      91bdad9e497d97f68d266bcb5ec8fe56d35312ce480be21795843b1aadcd9890

    • SHA512

      55b90bdd2e2be90b06accebd0a6b20465d8a201f339bf2f76439e290dbd3b577b791d29165b9a7eb5faa95cd634ed3b84bcfc18aa3eacce1d33b3ecfaad5333c

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks