General
-
Target
69753fe5c432a7fd71861f09333b7e27898d37365ef061a69c173948840b63d8
-
Size
326KB
-
Sample
220118-aj39qaegbn
-
MD5
b90ada414db7b1c6edf06db79ee2cba3
-
SHA1
8e1221108ce5f61213372b1f067724bb152ae89f
-
SHA256
69753fe5c432a7fd71861f09333b7e27898d37365ef061a69c173948840b63d8
-
SHA512
8fbdb1d959f90471d14ccfcc28c39c8fdbc86380ac04814cbda2b750189c34321c5c4dc042ac2a5956db2718f82a747ec59bbec5fc1cf65ca3bc92c0db5c4617
Static task
static1
Behavioral task
behavioral1
Sample
69753fe5c432a7fd71861f09333b7e27898d37365ef061a69c173948840b63d8.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
69753fe5c432a7fd71861f09333b7e27898d37365ef061a69c173948840b63d8
-
Size
326KB
-
MD5
b90ada414db7b1c6edf06db79ee2cba3
-
SHA1
8e1221108ce5f61213372b1f067724bb152ae89f
-
SHA256
69753fe5c432a7fd71861f09333b7e27898d37365ef061a69c173948840b63d8
-
SHA512
8fbdb1d959f90471d14ccfcc28c39c8fdbc86380ac04814cbda2b750189c34321c5c4dc042ac2a5956db2718f82a747ec59bbec5fc1cf65ca3bc92c0db5c4617
Score10/10-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-