General
-
Target
8a90097dfca5bbfd56e1ac13c0883b131696ac1d65a21540bff481dc841e929c
-
Size
301KB
-
Sample
220118-v34d2scdbk
-
MD5
b23ced0d2c8308762971c6a3666b5b7f
-
SHA1
2a0f90c0ddfbaef213faf7801a5f203caeb90511
-
SHA256
8a90097dfca5bbfd56e1ac13c0883b131696ac1d65a21540bff481dc841e929c
-
SHA512
4eb541e9f4f5d36565d3b139d30c7cbd18466333a40cdd7a5805787af2668c6dea5b6cd3308bebdded91fcd3351e8bf51d60c68a13be9e0361b6deb49de6eb3f
Static task
static1
Behavioral task
behavioral1
Sample
8a90097dfca5bbfd56e1ac13c0883b131696ac1d65a21540bff481dc841e929c.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
8a90097dfca5bbfd56e1ac13c0883b131696ac1d65a21540bff481dc841e929c
-
Size
301KB
-
MD5
b23ced0d2c8308762971c6a3666b5b7f
-
SHA1
2a0f90c0ddfbaef213faf7801a5f203caeb90511
-
SHA256
8a90097dfca5bbfd56e1ac13c0883b131696ac1d65a21540bff481dc841e929c
-
SHA512
4eb541e9f4f5d36565d3b139d30c7cbd18466333a40cdd7a5805787af2668c6dea5b6cd3308bebdded91fcd3351e8bf51d60c68a13be9e0361b6deb49de6eb3f
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-