General

  • Target

    f89ac77290ec6163c90573ba47a0df3ad796cef562dc2fe7b11462e7745612da

  • Size

    335KB

  • Sample

    220117-ndwjkshgb2

  • MD5

    48a30514ec65518840884b9d6d3611b1

  • SHA1

    5f87b47dcdd54e0e77359a52aca1f0d65b275130

  • SHA256

    f89ac77290ec6163c90573ba47a0df3ad796cef562dc2fe7b11462e7745612da

  • SHA512

    de35ba7aa222f6222122c8855dfd61204ff961ec722b40a7ed45daf061c3957db1de0c9253c12c314f071ca50995e7ae339284ddfa10890137fed34cc607cd76

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      f89ac77290ec6163c90573ba47a0df3ad796cef562dc2fe7b11462e7745612da

    • Size

      335KB

    • MD5

      48a30514ec65518840884b9d6d3611b1

    • SHA1

      5f87b47dcdd54e0e77359a52aca1f0d65b275130

    • SHA256

      f89ac77290ec6163c90573ba47a0df3ad796cef562dc2fe7b11462e7745612da

    • SHA512

      de35ba7aa222f6222122c8855dfd61204ff961ec722b40a7ed45daf061c3957db1de0c9253c12c314f071ca50995e7ae339284ddfa10890137fed34cc607cd76

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks