General
-
Target
e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c
-
Size
276KB
-
Sample
220116-1gbpssgdfj
-
MD5
e2e3f10e3276cd4f103c3ce13df04054
-
SHA1
c7cdebc9290e5b64fe8039b5b25f7a9849899dee
-
SHA256
e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c
-
SHA512
f374cd524d5f278037c629f4fe7fe725d7e443b1bd106a3aedcc36d0e94e337b23a995f9b79845e7bd71cd3018a854ae066d23f1686bf277ed2566a06b90b777
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c
-
Size
276KB
-
MD5
e2e3f10e3276cd4f103c3ce13df04054
-
SHA1
c7cdebc9290e5b64fe8039b5b25f7a9849899dee
-
SHA256
e89f463d880caa60a0730b0d3cf441cf6b58f2535304889701a7e2ee29974b1c
-
SHA512
f374cd524d5f278037c629f4fe7fe725d7e443b1bd106a3aedcc36d0e94e337b23a995f9b79845e7bd71cd3018a854ae066d23f1686bf277ed2566a06b90b777
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-