General

  • Target

    86b1514e74faa7b799c6afb16873202fe67ef1d28081b7ac5dacd49ca60130fd

  • Size

    280KB

  • Sample

    220117-fh67waggd5

  • MD5

    db4ad185fc751256fce38457da4add14

  • SHA1

    2dbf190c70f9b73c048a86e139eb37e42df9ac1d

  • SHA256

    86b1514e74faa7b799c6afb16873202fe67ef1d28081b7ac5dacd49ca60130fd

  • SHA512

    6a564fc293350f53541edcf807483434bf0b09d85c3523e95e321786fad534d36da7def7451da842ca9d9f2e579f14c458bdaf97e3bd3e07efcb0b34bc7039a6

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      86b1514e74faa7b799c6afb16873202fe67ef1d28081b7ac5dacd49ca60130fd

    • Size

      280KB

    • MD5

      db4ad185fc751256fce38457da4add14

    • SHA1

      2dbf190c70f9b73c048a86e139eb37e42df9ac1d

    • SHA256

      86b1514e74faa7b799c6afb16873202fe67ef1d28081b7ac5dacd49ca60130fd

    • SHA512

      6a564fc293350f53541edcf807483434bf0b09d85c3523e95e321786fad534d36da7def7451da842ca9d9f2e579f14c458bdaf97e3bd3e07efcb0b34bc7039a6

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks