General
-
Target
eb8d73cd91c8173b586b0ef8cf1953382d82dd75c5471b94d7768887412df465
-
Size
294KB
-
Sample
220118-k3mq7aafck
-
MD5
889f98a35668ce6f63cf3565e9df51da
-
SHA1
9451a0dcf157c2d5584a0eef8814ba68ba10e164
-
SHA256
eb8d73cd91c8173b586b0ef8cf1953382d82dd75c5471b94d7768887412df465
-
SHA512
0e864958a6e4216b5f165a28cb8db80695207528036429f909c7db3dd354291f89cdd7b913b0e5e7c918dceda4f67efad68cac7cf9e5d9b05c9920dc374b411a
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.5
470193d69fd872b73819c5e70dc68242c10ccbce
-
url4cnc
http://185.163.204.22/capibar
http://178.62.113.205/capibar
https://t.me/capibar
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
raccoon
1.8.4-hotfixs
Targets
-
-
Target
eb8d73cd91c8173b586b0ef8cf1953382d82dd75c5471b94d7768887412df465
-
Size
294KB
-
MD5
889f98a35668ce6f63cf3565e9df51da
-
SHA1
9451a0dcf157c2d5584a0eef8814ba68ba10e164
-
SHA256
eb8d73cd91c8173b586b0ef8cf1953382d82dd75c5471b94d7768887412df465
-
SHA512
0e864958a6e4216b5f165a28cb8db80695207528036429f909c7db3dd354291f89cdd7b913b0e5e7c918dceda4f67efad68cac7cf9e5d9b05c9920dc374b411a
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-