General
-
Target
f18d58bef26e6ab8efd44144c604aa8f
-
Size
324KB
-
Sample
220115-y5kw9sfcfr
-
MD5
f18d58bef26e6ab8efd44144c604aa8f
-
SHA1
23f59ac838757a2fd50421c22d7d3e4efb38a764
-
SHA256
0c33944390e326162e778e1c83c489034fd0ffe1e800070c8191ae1758f58b10
-
SHA512
52532f6f59eb05fd22fa037737846aa8f629938fe9c490fffd2be0d93b4165bb7f3c2592e139f036c062ad6f2b411d7346a866e1824371d4ca373ca790743729
Static task
static1
Behavioral task
behavioral1
Sample
f18d58bef26e6ab8efd44144c604aa8f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f18d58bef26e6ab8efd44144c604aa8f.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
f18d58bef26e6ab8efd44144c604aa8f
-
Size
324KB
-
MD5
f18d58bef26e6ab8efd44144c604aa8f
-
SHA1
23f59ac838757a2fd50421c22d7d3e4efb38a764
-
SHA256
0c33944390e326162e778e1c83c489034fd0ffe1e800070c8191ae1758f58b10
-
SHA512
52532f6f59eb05fd22fa037737846aa8f629938fe9c490fffd2be0d93b4165bb7f3c2592e139f036c062ad6f2b411d7346a866e1824371d4ca373ca790743729
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-