General

  • Target

    11d9d9042783bee4b88464ef4049913708b14a7f212cfc747732a34ee8794d83

  • Size

    330KB

  • Sample

    220117-vdaqfabfhp

  • MD5

    a4b9e0d0bfcca042e8d46e9278eba0ce

  • SHA1

    a66ed12a8bd9304221787c37421e1ce97bc831c1

  • SHA256

    11d9d9042783bee4b88464ef4049913708b14a7f212cfc747732a34ee8794d83

  • SHA512

    536e4b5369d8ae1beddda289a24e5572e97fc3f3fbcd1c6176a19add9c249237bfb3865063450bd8df1ae1fbe2f73600c6119af95976359e026eff05f55760e0

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      11d9d9042783bee4b88464ef4049913708b14a7f212cfc747732a34ee8794d83

    • Size

      330KB

    • MD5

      a4b9e0d0bfcca042e8d46e9278eba0ce

    • SHA1

      a66ed12a8bd9304221787c37421e1ce97bc831c1

    • SHA256

      11d9d9042783bee4b88464ef4049913708b14a7f212cfc747732a34ee8794d83

    • SHA512

      536e4b5369d8ae1beddda289a24e5572e97fc3f3fbcd1c6176a19add9c249237bfb3865063450bd8df1ae1fbe2f73600c6119af95976359e026eff05f55760e0

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Enterprise v6

Tasks