General
-
Target
c920b2de025019e9a406e9b2f0ac2cbbfc18d65eac15f59ca8921c5fb4bfa240
-
Size
5.0MB
-
Sample
220119-t22cmabeh7
-
MD5
dbe9736b562b2bcce0b531fdfeaded32
-
SHA1
a36ac4af321f97964885b801601aaee816f405d1
-
SHA256
c920b2de025019e9a406e9b2f0ac2cbbfc18d65eac15f59ca8921c5fb4bfa240
-
SHA512
9dc69b482a510482b6aa6992924daf39b96bb43ab9017d6919120288e3d7936717b21aa24cd12c51d64d446eecc626bdc0ddfd0222cff5fde8010d110edea849
Static task
static1
Behavioral task
behavioral1
Sample
c920b2de025019e9a406e9b2f0ac2cbbfc18d65eac15f59ca8921c5fb4bfa240.exe
Resource
win7-en-20211208
Malware Config
Extracted
arkei
Default
http://185.215.113.39/7vlcKuayFx.php
Targets
-
-
Target
c920b2de025019e9a406e9b2f0ac2cbbfc18d65eac15f59ca8921c5fb4bfa240
-
Size
5.0MB
-
MD5
dbe9736b562b2bcce0b531fdfeaded32
-
SHA1
a36ac4af321f97964885b801601aaee816f405d1
-
SHA256
c920b2de025019e9a406e9b2f0ac2cbbfc18d65eac15f59ca8921c5fb4bfa240
-
SHA512
9dc69b482a510482b6aa6992924daf39b96bb43ab9017d6919120288e3d7936717b21aa24cd12c51d64d446eecc626bdc0ddfd0222cff5fde8010d110edea849
-
Babadeda Crypter
-
Arkei Stealer Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-