Description
Arkei is an infostealer written in C++.
a4d932b3e26cfcd75ca8f634104529edb514bcfbd1e60f80053e89dcfdb3519f
318KB
220115-b4a94scbgl
b5b0b211db2cc4d5aafa0b369c651706
b45da76bd8c44d06829442e80733f6ecfdd81ec2
a4d932b3e26cfcd75ca8f634104529edb514bcfbd1e60f80053e89dcfdb3519f
b890dc08c802990912f88119623832367bd0a1920eab6ba3a841e3ecdb5ea3f875c730738d21b09fe1fb0b04d5efb6a101863b53747493f2e46deab3a329d50d
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | tofsee |
C2 |
patmushta.info parubey.info |
a4d932b3e26cfcd75ca8f634104529edb514bcfbd1e60f80053e89dcfdb3519f
b5b0b211db2cc4d5aafa0b369c651706
318KB
b45da76bd8c44d06829442e80733f6ecfdd81ec2
a4d932b3e26cfcd75ca8f634104529edb514bcfbd1e60f80053e89dcfdb3519f
b890dc08c802990912f88119623832367bd0a1920eab6ba3a841e3ecdb5ea3f875c730738d21b09fe1fb0b04d5efb6a101863b53747493f2e46deab3a329d50d
Arkei is an infostealer written in C++.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
BIOS information is often read in order to detect sandboxing environments.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.