General

  • Target

    33d732d1c08aca5c7b0e83bfd9c6d76520d2c71e09c090121bb1473b03fc3649

  • Size

    280KB

  • Sample

    220117-e4e5vaghgp

  • MD5

    3cdea2e17acec208a9f5fad3ae03ade4

  • SHA1

    8e50e1dafaf28a0ef825a36df5dfc42083dbe9c0

  • SHA256

    33d732d1c08aca5c7b0e83bfd9c6d76520d2c71e09c090121bb1473b03fc3649

  • SHA512

    5d3d2bc3178ada978775ac0e0c77ba6f4ea12cb7726ff0c0e83670fe6274ac88ecf57cb7cc14ff20856914d1d3b1862599832bc4b3b99e59fada027b65238370

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      33d732d1c08aca5c7b0e83bfd9c6d76520d2c71e09c090121bb1473b03fc3649

    • Size

      280KB

    • MD5

      3cdea2e17acec208a9f5fad3ae03ade4

    • SHA1

      8e50e1dafaf28a0ef825a36df5dfc42083dbe9c0

    • SHA256

      33d732d1c08aca5c7b0e83bfd9c6d76520d2c71e09c090121bb1473b03fc3649

    • SHA512

      5d3d2bc3178ada978775ac0e0c77ba6f4ea12cb7726ff0c0e83670fe6274ac88ecf57cb7cc14ff20856914d1d3b1862599832bc4b3b99e59fada027b65238370

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks