General
-
Target
5b5db3516b7e66c0ad16c469e3034bcd793519cd3a1f6c580fdd80c35e93154b
-
Size
302KB
-
Sample
220119-tqmebsbdcr
-
MD5
07376709606bfb94bdf7dfd17b59919d
-
SHA1
fbdc3d54e6c3220b3ecee37b3cf4bb55a87ec66a
-
SHA256
5b5db3516b7e66c0ad16c469e3034bcd793519cd3a1f6c580fdd80c35e93154b
-
SHA512
476dc618a5ba82b3ba549aecc7aab019358be0d22319db0e2d1fe94fe2bdea18fb81ea8b9edd41cb5b0b83651ebe6fb80a1763b68b17d4cc5cef24d7ac6ff267
Static task
static1
Behavioral task
behavioral1
Sample
5b5db3516b7e66c0ad16c469e3034bcd793519cd3a1f6c580fdd80c35e93154b.exe
Resource
win10-en-20211208
Malware Config
Extracted
arkei
homesteadr
http://homesteadr.link/ggate.php
Targets
-
-
Target
5b5db3516b7e66c0ad16c469e3034bcd793519cd3a1f6c580fdd80c35e93154b
-
Size
302KB
-
MD5
07376709606bfb94bdf7dfd17b59919d
-
SHA1
fbdc3d54e6c3220b3ecee37b3cf4bb55a87ec66a
-
SHA256
5b5db3516b7e66c0ad16c469e3034bcd793519cd3a1f6c580fdd80c35e93154b
-
SHA512
476dc618a5ba82b3ba549aecc7aab019358be0d22319db0e2d1fe94fe2bdea18fb81ea8b9edd41cb5b0b83651ebe6fb80a1763b68b17d4cc5cef24d7ac6ff267
Score10/10-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-