Description
Arkei is an infostealer written in C++.
51eed7010db80332549130ed08c219416a3a77c87e47af18dea31d0abddf7bce
318KB
220115-bqdhbabgc4
b0857a379795a487414056023582b087
c942ba1951f8fbb19de01b189041386b8c773500
51eed7010db80332549130ed08c219416a3a77c87e47af18dea31d0abddf7bce
681e9fafecf5aaaa01ea401f6c1b678fdee689391e965c72489d5aef2db9a32601e5b44074dd9c3e05b6396a8d60560a22e211f2476d712f76fb32a81efdcd90
Family | smokeloader |
Version | 2020 |
C2 |
http://host-data-coin-11.com/ http://file-coin-host-12.com/ http://srtuiyhuali.at/ http://fufuiloirtu.com/ http://amogohuigotuli.at/ http://novohudosovu.com/ http://brutuilionust.com/ http://bubushkalioua.com/ http://dumuilistrati.at/ http://verboliatsiaeeees.com/ |
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
rc4.i32 |
|
Family | arkei |
Botnet | Default |
C2 |
http://file-file-host4.com/tratata.php |
Family | tofsee |
C2 |
patmushta.info parubey.info |
Family | raccoon |
Version | 1.8.4-hotfixs |
rc4.plain |
|
rc4.plain |
|
Family | vidar |
Version | 49.6 |
Botnet | 1127 |
C2 |
https://noc.social/@banda5ker https://mastodon.social/@banda6ker |
Attributes |
profile_id 1127 |
51eed7010db80332549130ed08c219416a3a77c87e47af18dea31d0abddf7bce
b0857a379795a487414056023582b087
318KB
c942ba1951f8fbb19de01b189041386b8c773500
51eed7010db80332549130ed08c219416a3a77c87e47af18dea31d0abddf7bce
681e9fafecf5aaaa01ea401f6c1b678fdee689391e965c72489d5aef2db9a32601e5b44074dd9c3e05b6396a8d60560a22e211f2476d712f76fb32a81efdcd90
Arkei is an infostealer written in C++.
LoaderBot is a loader written in .NET downloading and executing miners.
Simple but powerful infostealer which was very active in 2019.
Modular backdoor trojan in use since 2014.
Backdoor/botnet which carries out malicious activities based on commands from a C2 server.
Vidar is an infostealer based on Arkei stealer.
XMRig is a high performance, open source, cross platform CPU/GPU miner.
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Looks up Uninstall key entries in the registry to enumerate software on the system.
Uses a legitimate IP lookup service to find the infected system's external IP.