General
-
Target
ed058c5ddb188f088fbd4322e499e7325d6619680262c95971503834a02d645e
-
Size
284KB
-
Sample
220118-mt4dpaahgq
-
MD5
3e10fb59fc968db23e349d04d95c6c99
-
SHA1
5122e6ba0883a309cb99672ad50dedef528865cb
-
SHA256
ed058c5ddb188f088fbd4322e499e7325d6619680262c95971503834a02d645e
-
SHA512
288f916bee05e170cec5fc272d7a472d17139d255a0118abb9314a04827db539dca411d070ae16eacd7a85a19abb40170c29c58806d1fd127329d833fbca2f89
Static task
static1
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Extracted
raccoon
1.8.5
470193d69fd872b73819c5e70dc68242c10ccbce
-
url4cnc
http://185.163.204.22/capibar
http://178.62.113.205/capibar
https://t.me/capibar
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
ed058c5ddb188f088fbd4322e499e7325d6619680262c95971503834a02d645e
-
Size
284KB
-
MD5
3e10fb59fc968db23e349d04d95c6c99
-
SHA1
5122e6ba0883a309cb99672ad50dedef528865cb
-
SHA256
ed058c5ddb188f088fbd4322e499e7325d6619680262c95971503834a02d645e
-
SHA512
288f916bee05e170cec5fc272d7a472d17139d255a0118abb9314a04827db539dca411d070ae16eacd7a85a19abb40170c29c58806d1fd127329d833fbca2f89
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-