General

  • Target

    71457dd5169674639c40ac3de5717570b70acef944dea60ffe51eecfde5c5494

  • Size

    277KB

  • Sample

    220116-zn2n5agdbr

  • MD5

    2cb4ab25fe8c402a796ee6a3a5098a06

  • SHA1

    a0b244bd735aa26e8c905f7ddf883b4440866dba

  • SHA256

    71457dd5169674639c40ac3de5717570b70acef944dea60ffe51eecfde5c5494

  • SHA512

    5ae3f86176247c38104a55839898cbc36b5425d49e6a3ed58f00a3db6b03fe212b2edaec754562a94fdc086cf9116247b5079fe2b08cda3d6b7a1c3599fb5606

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      71457dd5169674639c40ac3de5717570b70acef944dea60ffe51eecfde5c5494

    • Size

      277KB

    • MD5

      2cb4ab25fe8c402a796ee6a3a5098a06

    • SHA1

      a0b244bd735aa26e8c905f7ddf883b4440866dba

    • SHA256

      71457dd5169674639c40ac3de5717570b70acef944dea60ffe51eecfde5c5494

    • SHA512

      5ae3f86176247c38104a55839898cbc36b5425d49e6a3ed58f00a3db6b03fe212b2edaec754562a94fdc086cf9116247b5079fe2b08cda3d6b7a1c3599fb5606

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Enterprise v6

Tasks