General
-
Target
b84cf95eacc737d3bdfb307322a3df6da493ce0e7199834f7e5a92229325cac3
-
Size
280KB
-
Sample
220117-jsglrahcdm
-
MD5
123c9e90583092573f03cdd1972f5043
-
SHA1
ed96fb4b5bc16b7c62a3f8c342298202f6963919
-
SHA256
b84cf95eacc737d3bdfb307322a3df6da493ce0e7199834f7e5a92229325cac3
-
SHA512
46394a22cca72b2b4588f180fe49f776c135d94393dc3de0b797e7f4c5f759505040545179f3f807f0bcf93720772353d68f845f77370349cbfec165a21aa2ab
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
b84cf95eacc737d3bdfb307322a3df6da493ce0e7199834f7e5a92229325cac3
-
Size
280KB
-
MD5
123c9e90583092573f03cdd1972f5043
-
SHA1
ed96fb4b5bc16b7c62a3f8c342298202f6963919
-
SHA256
b84cf95eacc737d3bdfb307322a3df6da493ce0e7199834f7e5a92229325cac3
-
SHA512
46394a22cca72b2b4588f180fe49f776c135d94393dc3de0b797e7f4c5f759505040545179f3f807f0bcf93720772353d68f845f77370349cbfec165a21aa2ab
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-