General
-
Target
493acb0c63e1a0c3ab31bf07cb42f674508591b7e90363f96f1a13977dee7648
-
Size
302KB
-
Sample
220119-vm4pwabgf5
-
MD5
05f8731d2bface963f6a6276a77a95c7
-
SHA1
bccb462cba9b49eba1e7c5347c8b2239415c252c
-
SHA256
493acb0c63e1a0c3ab31bf07cb42f674508591b7e90363f96f1a13977dee7648
-
SHA512
a2b782ea964a9e9f817c7fba04e282813a3477e7f1059b569719425b77622ee1471354d4f04ef1599c5d4337753894c5913dfe2d36eb767a8b8c6fc0035b2437
Static task
static1
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
493acb0c63e1a0c3ab31bf07cb42f674508591b7e90363f96f1a13977dee7648
-
Size
302KB
-
MD5
05f8731d2bface963f6a6276a77a95c7
-
SHA1
bccb462cba9b49eba1e7c5347c8b2239415c252c
-
SHA256
493acb0c63e1a0c3ab31bf07cb42f674508591b7e90363f96f1a13977dee7648
-
SHA512
a2b782ea964a9e9f817c7fba04e282813a3477e7f1059b569719425b77622ee1471354d4f04ef1599c5d4337753894c5913dfe2d36eb767a8b8c6fc0035b2437
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-