General
-
Target
d56eead8edec63940c9a511283721d62218b72f28502417355e6768bbc0a4648
-
Size
334KB
-
Sample
220117-rveh6safd7
-
MD5
4a573f8549af63bbc1d5eea398715cb5
-
SHA1
f201b0dbda606a354d8f3392c07f030531c2fe27
-
SHA256
d56eead8edec63940c9a511283721d62218b72f28502417355e6768bbc0a4648
-
SHA512
da2c37dc7a8775c21655f2ee928ee07785fcbcb0db681eddb22c904e16a18aceb0e79bcfbc7f620fd414e775f94bf5030d48dcf875591e056eb0ccf1828d97e8
Static task
static1
Behavioral task
behavioral1
Sample
d56eead8edec63940c9a511283721d62218b72f28502417355e6768bbc0a4648.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
d56eead8edec63940c9a511283721d62218b72f28502417355e6768bbc0a4648
-
Size
334KB
-
MD5
4a573f8549af63bbc1d5eea398715cb5
-
SHA1
f201b0dbda606a354d8f3392c07f030531c2fe27
-
SHA256
d56eead8edec63940c9a511283721d62218b72f28502417355e6768bbc0a4648
-
SHA512
da2c37dc7a8775c21655f2ee928ee07785fcbcb0db681eddb22c904e16a18aceb0e79bcfbc7f620fd414e775f94bf5030d48dcf875591e056eb0ccf1828d97e8
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-