General

  • Target

    080d41ef097ff4647c9b7901ddc8fc3ffdb3c9cb0f360e3fe96a591a9f8089a6

  • Size

    321KB

  • Sample

    220115-djm5aaceck

  • MD5

    6e523997cd54aed7677321782220c00c

  • SHA1

    7cd2498ea34d7d80e41697e6adc2a07bb018acc0

  • SHA256

    080d41ef097ff4647c9b7901ddc8fc3ffdb3c9cb0f360e3fe96a591a9f8089a6

  • SHA512

    5d772e0618cf0583f3eae92391c003800d86562bf80bc9c6c456746449373038e058057a4d633ac69a609a6ef733cc672bdaefd3825c2a39e9f71d26cb678cb6

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      080d41ef097ff4647c9b7901ddc8fc3ffdb3c9cb0f360e3fe96a591a9f8089a6

    • Size

      321KB

    • MD5

      6e523997cd54aed7677321782220c00c

    • SHA1

      7cd2498ea34d7d80e41697e6adc2a07bb018acc0

    • SHA256

      080d41ef097ff4647c9b7901ddc8fc3ffdb3c9cb0f360e3fe96a591a9f8089a6

    • SHA512

      5d772e0618cf0583f3eae92391c003800d86562bf80bc9c6c456746449373038e058057a4d633ac69a609a6ef733cc672bdaefd3825c2a39e9f71d26cb678cb6

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Enterprise v6

Tasks