General
-
Target
255838-5724_1640264626_3269.exe
-
Size
1.6MB
-
Sample
220114-zn52jsaghj
-
MD5
719710579599927fa9d972472e8a66b1
-
SHA1
bdbc817efc196fd7cdbcb392e24375e03ed91b11
-
SHA256
255838ffda0bd0d6c2565eed99d9497ffff2b7822b1a23c993251dfbf8a4a646
-
SHA512
183d02bda63e9435f388b8598788d74585f474f823d5aa792477e420da21b45b8cef791f1460e3f782be4b6033423e54c736c4305ee223ef7497cc15fe44c330
Static task
static1
Malware Config
Extracted
arkei
Default
http://185.7.214.239/POeNDXYchB.php
Targets
-
-
Target
255838-5724_1640264626_3269.exe
-
Size
1.6MB
-
MD5
719710579599927fa9d972472e8a66b1
-
SHA1
bdbc817efc196fd7cdbcb392e24375e03ed91b11
-
SHA256
255838ffda0bd0d6c2565eed99d9497ffff2b7822b1a23c993251dfbf8a4a646
-
SHA512
183d02bda63e9435f388b8598788d74585f474f823d5aa792477e420da21b45b8cef791f1460e3f782be4b6033423e54c736c4305ee223ef7497cc15fe44c330
-
Arkei Stealer Payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-