General
-
Target
0511d2a93c09ed163a69f371a6288a6ecc2357a20a97d7c631e2363af6c930f0
-
Size
327KB
-
Sample
220118-lrhhrsagck
-
MD5
11b1984c47e6a2a87aee64fed0528554
-
SHA1
3a26af51254f2a714090dbb986514572f21cd59a
-
SHA256
0511d2a93c09ed163a69f371a6288a6ecc2357a20a97d7c631e2363af6c930f0
-
SHA512
ef06b512b6c978b1aa84f9bf17c3185a545c894d33afaca43b6eab0e5c54f121d4bd65ca1a24682d7a9110631761ab40b58ccb5a07796acfd7205b97d8f98e9c
Static task
static1
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
0511d2a93c09ed163a69f371a6288a6ecc2357a20a97d7c631e2363af6c930f0
-
Size
327KB
-
MD5
11b1984c47e6a2a87aee64fed0528554
-
SHA1
3a26af51254f2a714090dbb986514572f21cd59a
-
SHA256
0511d2a93c09ed163a69f371a6288a6ecc2357a20a97d7c631e2363af6c930f0
-
SHA512
ef06b512b6c978b1aa84f9bf17c3185a545c894d33afaca43b6eab0e5c54f121d4bd65ca1a24682d7a9110631761ab40b58ccb5a07796acfd7205b97d8f98e9c
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-