General
-
Target
6ddb0bfa1addfb2017913f0e0b70fa19c3714046117859df6a7319c606154506
-
Size
315KB
-
Sample
220115-psv22aeca2
-
MD5
88e8761eea7b1418f62f7d63a2bc3e5a
-
SHA1
4cb0ec77e2228e76da347479a5cae2885a436c0c
-
SHA256
6ddb0bfa1addfb2017913f0e0b70fa19c3714046117859df6a7319c606154506
-
SHA512
53f242d543bb2dac63ca15be51650614f20a727a92eef49f7624041d43439e0c50dc87f25a3675a282aed246f60d6279fc5ee84c658676de3b6bbebd7d0bffa4
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
6ddb0bfa1addfb2017913f0e0b70fa19c3714046117859df6a7319c606154506
-
Size
315KB
-
MD5
88e8761eea7b1418f62f7d63a2bc3e5a
-
SHA1
4cb0ec77e2228e76da347479a5cae2885a436c0c
-
SHA256
6ddb0bfa1addfb2017913f0e0b70fa19c3714046117859df6a7319c606154506
-
SHA512
53f242d543bb2dac63ca15be51650614f20a727a92eef49f7624041d43439e0c50dc87f25a3675a282aed246f60d6279fc5ee84c658676de3b6bbebd7d0bffa4
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-