General
-
Target
cc9f09a3c0ce59ae94a6e6ff1ebd8918edf45ffefc04ff5e5ee66e0ef61c092a
-
Size
331KB
-
Sample
220121-hlj8maecc5
-
MD5
9a50dfe76a7aa41c0484c0f8a75933ac
-
SHA1
536051799989ac960d34b99262673e5b922cc37f
-
SHA256
cc9f09a3c0ce59ae94a6e6ff1ebd8918edf45ffefc04ff5e5ee66e0ef61c092a
-
SHA512
3997da218bb839cc23f8fc03d84d4c82bc66f74100b6b1c0b111bf8bdf2b404a65c2ebcbe57681e9407635623a2e0a908281fbcc018b126690ebc36c8c8e20f5
Static task
static1
Malware Config
Extracted
arkei
Default
http://homesteadr.link/ggate.php
Targets
-
-
Target
cc9f09a3c0ce59ae94a6e6ff1ebd8918edf45ffefc04ff5e5ee66e0ef61c092a
-
Size
331KB
-
MD5
9a50dfe76a7aa41c0484c0f8a75933ac
-
SHA1
536051799989ac960d34b99262673e5b922cc37f
-
SHA256
cc9f09a3c0ce59ae94a6e6ff1ebd8918edf45ffefc04ff5e5ee66e0ef61c092a
-
SHA512
3997da218bb839cc23f8fc03d84d4c82bc66f74100b6b1c0b111bf8bdf2b404a65c2ebcbe57681e9407635623a2e0a908281fbcc018b126690ebc36c8c8e20f5
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-