General

  • Target

    0b11c8b1a563b6178e27fe323665aca06a679f98c4d041fde2767caa3f173aab

  • Size

    326KB

  • Sample

    220118-dwfwqsgdhm

  • MD5

    bc3fd01db98ef7790bb357c09ea80fea

  • SHA1

    d69cd37c40082cabb4cc51c61e9ae1ff5d2ea13c

  • SHA256

    0b11c8b1a563b6178e27fe323665aca06a679f98c4d041fde2767caa3f173aab

  • SHA512

    cc98007abba10f067d4a92b48eb787220dfc31eada6d9635a50ec463357580c9bcd74d364ec3484efdf0871fae95a989fae16ee563ef21440afd4d9f9a021e7e

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Targets

    • Target

      0b11c8b1a563b6178e27fe323665aca06a679f98c4d041fde2767caa3f173aab

    • Size

      326KB

    • MD5

      bc3fd01db98ef7790bb357c09ea80fea

    • SHA1

      d69cd37c40082cabb4cc51c61e9ae1ff5d2ea13c

    • SHA256

      0b11c8b1a563b6178e27fe323665aca06a679f98c4d041fde2767caa3f173aab

    • SHA512

      cc98007abba10f067d4a92b48eb787220dfc31eada6d9635a50ec463357580c9bcd74d364ec3484efdf0871fae95a989fae16ee563ef21440afd4d9f9a021e7e

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Arkei Stealer Payload

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks