General

  • Target

    e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c

  • Size

    276KB

  • Sample

    220116-1gbpssgdfj

  • MD5

    e2e3f10e3276cd4f103c3ce13df04054

  • SHA1

    c7cdebc9290e5b64fe8039b5b25f7a9849899dee

  • SHA256

    e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c

  • SHA512

    f374cd524d5f278037c629f4fe7fe725d7e443b1bd106a3aedcc36d0e94e337b23a995f9b79845e7bd71cd3018a854ae066d23f1686bf277ed2566a06b90b777

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c

    • Size

      276KB

    • MD5

      e2e3f10e3276cd4f103c3ce13df04054

    • SHA1

      c7cdebc9290e5b64fe8039b5b25f7a9849899dee

    • SHA256

      e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c

    • SHA512

      f374cd524d5f278037c629f4fe7fe725d7e443b1bd106a3aedcc36d0e94e337b23a995f9b79845e7bd71cd3018a854ae066d23f1686bf277ed2566a06b90b777

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks