General
-
Target
72cf12f19e074a4b77b4c827d4a1c2752145b7d28bf87029851430657970e681
-
Size
326KB
-
Sample
220118-hsshksacbm
-
MD5
c5ed112e235201a97952e60178764740
-
SHA1
f6342435ffa73e32219da59aa555dd56559fb274
-
SHA256
72cf12f19e074a4b77b4c827d4a1c2752145b7d28bf87029851430657970e681
-
SHA512
5350a7cfa5bb4f967f1efbd8c4ba2bc6ce972911c6e39af80dd4f6ae0f68862147037bce2f09210e6c281b1afdb7a8bffb3849734f5f52728d1e5ac6a1680810
Static task
static1
Behavioral task
behavioral1
Sample
72cf12f19e074a4b77b4c827d4a1c2752145b7d28bf87029851430657970e681.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
72cf12f19e074a4b77b4c827d4a1c2752145b7d28bf87029851430657970e681
-
Size
326KB
-
MD5
c5ed112e235201a97952e60178764740
-
SHA1
f6342435ffa73e32219da59aa555dd56559fb274
-
SHA256
72cf12f19e074a4b77b4c827d4a1c2752145b7d28bf87029851430657970e681
-
SHA512
5350a7cfa5bb4f967f1efbd8c4ba2bc6ce972911c6e39af80dd4f6ae0f68862147037bce2f09210e6c281b1afdb7a8bffb3849734f5f52728d1e5ac6a1680810
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-