General
-
Target
ff0fabc2ac5a1d0d525ad4055e4dd007a6854f622ab8b7864cfbd4cccd0c1a57
-
Size
331KB
-
Sample
220117-v3clbsbea4
-
MD5
fa018fc109f3a207839382261b70b62c
-
SHA1
a7b5708a70d5802b185d0979d5081c5d1e3d9304
-
SHA256
ff0fabc2ac5a1d0d525ad4055e4dd007a6854f622ab8b7864cfbd4cccd0c1a57
-
SHA512
93613792253c824af65efa34e2b2e7c53fe27f55e2d365317bf6f742949aed87f422f1d527e272d8fb362f49a9f3a5dc1ec517d6a13cb03bfdd37e96a0b2433b
Static task
static1
Behavioral task
behavioral1
Sample
ff0fabc2ac5a1d0d525ad4055e4dd007a6854f622ab8b7864cfbd4cccd0c1a57.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
ff0fabc2ac5a1d0d525ad4055e4dd007a6854f622ab8b7864cfbd4cccd0c1a57
-
Size
331KB
-
MD5
fa018fc109f3a207839382261b70b62c
-
SHA1
a7b5708a70d5802b185d0979d5081c5d1e3d9304
-
SHA256
ff0fabc2ac5a1d0d525ad4055e4dd007a6854f622ab8b7864cfbd4cccd0c1a57
-
SHA512
93613792253c824af65efa34e2b2e7c53fe27f55e2d365317bf6f742949aed87f422f1d527e272d8fb362f49a9f3a5dc1ec517d6a13cb03bfdd37e96a0b2433b
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-