General

  • Target

    df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23

  • Size

    322KB

  • Sample

    220115-hl5vbsdah3

  • MD5

    f21c3cdf44c7c0f5c380dcd447a26f09

  • SHA1

    b1c0dd60ced6f57fb81e8bcee096aa6d20a6455e

  • SHA256

    df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23

  • SHA512

    66cf4e6eb78c58e7c8336ae162c66de40a9b6dbdfecd06d8b8f684ef4e39007c1b6cac71729c6e27d19c4eb5e65fb5a5a884c672cc6d3e4ee748a289e5abd76e

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23

    • Size

      322KB

    • MD5

      f21c3cdf44c7c0f5c380dcd447a26f09

    • SHA1

      b1c0dd60ced6f57fb81e8bcee096aa6d20a6455e

    • SHA256

      df17f6f93bf7a187f675f7246a862dac1eef92b6ecfb4d3c99aea573f3492f23

    • SHA512

      66cf4e6eb78c58e7c8336ae162c66de40a9b6dbdfecd06d8b8f684ef4e39007c1b6cac71729c6e27d19c4eb5e65fb5a5a884c672cc6d3e4ee748a289e5abd76e

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Enterprise v6

Tasks