General
-
Target
a74a33005f023e5239a671a89c969e524c49e3b0a2e20fdef22609ce0c5b4334
-
Size
336KB
-
Sample
220117-n6cbeaaccm
-
MD5
2fd09b6fbbe6857f8d5fd23cd64219a1
-
SHA1
e66d1df65222f9e0e847a38b864f9a1c39033c3d
-
SHA256
a74a33005f023e5239a671a89c969e524c49e3b0a2e20fdef22609ce0c5b4334
-
SHA512
16a0f45f11db0debb73b53b8ca466204fa071a046fb322d3d020e3efcbffac354f8baa2bf48dac829d6e23ff17a93004160e55e7557ede4ff646c3724dbc2f53
Static task
static1
Behavioral task
behavioral1
Sample
a74a33005f023e5239a671a89c969e524c49e3b0a2e20fdef22609ce0c5b4334.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
a74a33005f023e5239a671a89c969e524c49e3b0a2e20fdef22609ce0c5b4334
-
Size
336KB
-
MD5
2fd09b6fbbe6857f8d5fd23cd64219a1
-
SHA1
e66d1df65222f9e0e847a38b864f9a1c39033c3d
-
SHA256
a74a33005f023e5239a671a89c969e524c49e3b0a2e20fdef22609ce0c5b4334
-
SHA512
16a0f45f11db0debb73b53b8ca466204fa071a046fb322d3d020e3efcbffac354f8baa2bf48dac829d6e23ff17a93004160e55e7557ede4ff646c3724dbc2f53
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-