General
-
Target
105be93c98f8fd1c959941e8ef5c12b970264c71487412600eef12bf531a6c97
-
Size
326KB
-
Sample
220118-kd957aaebl
-
MD5
539068dab97004554d3436d5033021d4
-
SHA1
dde2446c9b3866aeea35941bd8362489811e7f02
-
SHA256
105be93c98f8fd1c959941e8ef5c12b970264c71487412600eef12bf531a6c97
-
SHA512
3ee685b2d475a58a804a1904c33e267037f55794060113398d71519089b2ef858ecd85a2624d195ef4bb6ba40b6518af73256b12a77ef68fec91be2003b53b0d
Static task
static1
Behavioral task
behavioral1
Sample
105be93c98f8fd1c959941e8ef5c12b970264c71487412600eef12bf531a6c97.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
105be93c98f8fd1c959941e8ef5c12b970264c71487412600eef12bf531a6c97
-
Size
326KB
-
MD5
539068dab97004554d3436d5033021d4
-
SHA1
dde2446c9b3866aeea35941bd8362489811e7f02
-
SHA256
105be93c98f8fd1c959941e8ef5c12b970264c71487412600eef12bf531a6c97
-
SHA512
3ee685b2d475a58a804a1904c33e267037f55794060113398d71519089b2ef858ecd85a2624d195ef4bb6ba40b6518af73256b12a77ef68fec91be2003b53b0d
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-