General

  • Target

    c0ac9a557eda535bd9e4de6fd2b7baa06dd6a5307d319cf28bdfe36c7ca976b2

  • Size

    301KB

  • Sample

    220118-z4b4eadda6

  • MD5

    16e7434e47fa2f9a93ff6abbf98fbaf2

  • SHA1

    8a45a43a9a9ef59c1e085dc7467a406403c0c3af

  • SHA256

    c0ac9a557eda535bd9e4de6fd2b7baa06dd6a5307d319cf28bdfe36c7ca976b2

  • SHA512

    689a15ae648e8703bd93470376c2485aa3ea1f64082955c665cef36c4e95f486f1c72625aad73cfd1d59eaa903cea086b7eaa4c9d482fd5ce52febdfdd6fe29a

Malware Config

Extracted

Family

arkei

Botnet

homesteadr

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      c0ac9a557eda535bd9e4de6fd2b7baa06dd6a5307d319cf28bdfe36c7ca976b2

    • Size

      301KB

    • MD5

      16e7434e47fa2f9a93ff6abbf98fbaf2

    • SHA1

      8a45a43a9a9ef59c1e085dc7467a406403c0c3af

    • SHA256

      c0ac9a557eda535bd9e4de6fd2b7baa06dd6a5307d319cf28bdfe36c7ca976b2

    • SHA512

      689a15ae648e8703bd93470376c2485aa3ea1f64082955c665cef36c4e95f486f1c72625aad73cfd1d59eaa903cea086b7eaa4c9d482fd5ce52febdfdd6fe29a

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks