General
-
Target
ec57a52539299785b852e92ad604626beb6fe64ced7dde75724d9da193514a08
-
Size
327KB
-
Sample
220118-fxkmesheck
-
MD5
78a302da417ea885d0b2ed8fb33f5709
-
SHA1
551c4b546af341582c586d52229d6f2d8788ae40
-
SHA256
ec57a52539299785b852e92ad604626beb6fe64ced7dde75724d9da193514a08
-
SHA512
cd0cf5ee57fdbf79dad71309eec67de9514ba81b833296c47b7e19bb47207dac6ae92fa68d55ae553d1f8f57befd614d69c5e8f355bacb65fddc11a9bcbd9671
Static task
static1
Behavioral task
behavioral1
Sample
ec57a52539299785b852e92ad604626beb6fe64ced7dde75724d9da193514a08.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
ec57a52539299785b852e92ad604626beb6fe64ced7dde75724d9da193514a08
-
Size
327KB
-
MD5
78a302da417ea885d0b2ed8fb33f5709
-
SHA1
551c4b546af341582c586d52229d6f2d8788ae40
-
SHA256
ec57a52539299785b852e92ad604626beb6fe64ced7dde75724d9da193514a08
-
SHA512
cd0cf5ee57fdbf79dad71309eec67de9514ba81b833296c47b7e19bb47207dac6ae92fa68d55ae553d1f8f57befd614d69c5e8f355bacb65fddc11a9bcbd9671
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-