General
-
Target
c72b0d0159dc7b63d534ced5d0b07388be9ea4efc5b0dafaab0f4c081119c1b8
-
Size
280KB
-
Sample
220117-mtklksheh8
-
MD5
32e1ba395eaa235596885ccf14cf79ab
-
SHA1
839b52680d2fc8a9119327aa932c940caa8473ba
-
SHA256
c72b0d0159dc7b63d534ced5d0b07388be9ea4efc5b0dafaab0f4c081119c1b8
-
SHA512
de7a94f8facc2bcf2140b730db9dd54d28d2eead6f185648e0564906887ee14e91e1ce921583b7cf89f569d83977bfb767ddd33dbabe0fcd7da99fbfc522ffeb
Static task
static1
Behavioral task
behavioral1
Sample
c72b0d0159dc7b63d534ced5d0b07388be9ea4efc5b0dafaab0f4c081119c1b8.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
c72b0d0159dc7b63d534ced5d0b07388be9ea4efc5b0dafaab0f4c081119c1b8
-
Size
280KB
-
MD5
32e1ba395eaa235596885ccf14cf79ab
-
SHA1
839b52680d2fc8a9119327aa932c940caa8473ba
-
SHA256
c72b0d0159dc7b63d534ced5d0b07388be9ea4efc5b0dafaab0f4c081119c1b8
-
SHA512
de7a94f8facc2bcf2140b730db9dd54d28d2eead6f185648e0564906887ee14e91e1ce921583b7cf89f569d83977bfb767ddd33dbabe0fcd7da99fbfc522ffeb
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-