General

  • Target

    0a316af9f714ce039ee7a41054ab2e172025375aec312b1ed5b89cb8746deaa6

  • Size

    326KB

  • Sample

    220118-amcwyaedc6

  • MD5

    340cfb60356ea89aa64d67085131b08d

  • SHA1

    f7fb04e8e02b81982b9634b7a57c631e5ed97e2c

  • SHA256

    0a316af9f714ce039ee7a41054ab2e172025375aec312b1ed5b89cb8746deaa6

  • SHA512

    68e645ffd97ce21ffea12dc5df3088f9663f8c0c5fedb7e36829dc59de6a50e5755220b6d12826f03663cc4cacf82c0d9454fa5433c46de1c32321673ede3657

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      0a316af9f714ce039ee7a41054ab2e172025375aec312b1ed5b89cb8746deaa6

    • Size

      326KB

    • MD5

      340cfb60356ea89aa64d67085131b08d

    • SHA1

      f7fb04e8e02b81982b9634b7a57c631e5ed97e2c

    • SHA256

      0a316af9f714ce039ee7a41054ab2e172025375aec312b1ed5b89cb8746deaa6

    • SHA512

      68e645ffd97ce21ffea12dc5df3088f9663f8c0c5fedb7e36829dc59de6a50e5755220b6d12826f03663cc4cacf82c0d9454fa5433c46de1c32321673ede3657

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks