General

  • Target

    3443c50a3f82c68489c42f416079135d

  • Size

    280KB

  • Sample

    220117-mg376ahgem

  • MD5

    3443c50a3f82c68489c42f416079135d

  • SHA1

    c55d29de699a66ffc4df52dbb917e3ac40759523

  • SHA256

    85dd04331f4c472e795d3cd3fbd9f6fd165b05af55aa94d429a2c90d56c46227

  • SHA512

    b03eb8159c2edf8f17c14e32e48de2673a4a1cd4fc27345af16bbb161ddd4bc1a2bc2a5a392819dc50644e0ccfc47d16372d3d2ccec36860d6569b75c6398ca8

Malware Config

Extracted

Family

arkei

Botnet

homesteadr

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      3443c50a3f82c68489c42f416079135d

    • Size

      280KB

    • MD5

      3443c50a3f82c68489c42f416079135d

    • SHA1

      c55d29de699a66ffc4df52dbb917e3ac40759523

    • SHA256

      85dd04331f4c472e795d3cd3fbd9f6fd165b05af55aa94d429a2c90d56c46227

    • SHA512

      b03eb8159c2edf8f17c14e32e48de2673a4a1cd4fc27345af16bbb161ddd4bc1a2bc2a5a392819dc50644e0ccfc47d16372d3d2ccec36860d6569b75c6398ca8

    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks