General

  • Target

    a633eeb6547b40c041245cf77870d5b560b86647c44b42d8dc8ad049121d4da6

  • Size

    332KB

  • Sample

    220121-xm5chsbaej

  • MD5

    72b3dd38d6b9df2bd58a01321f5aede5

  • SHA1

    a247e1a175733fb812cd1a1bb25b9e7959266fb8

  • SHA256

    a633eeb6547b40c041245cf77870d5b560b86647c44b42d8dc8ad049121d4da6

  • SHA512

    b2a00a13edb338ce5ae23a299a9304f20ebc02902267c0ac1778c6d854089760b96cc90384bea47dd5a797638a729c1f353923bb70cddfbd1cecd8a857714e43

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      a633eeb6547b40c041245cf77870d5b560b86647c44b42d8dc8ad049121d4da6

    • Size

      332KB

    • MD5

      72b3dd38d6b9df2bd58a01321f5aede5

    • SHA1

      a247e1a175733fb812cd1a1bb25b9e7959266fb8

    • SHA256

      a633eeb6547b40c041245cf77870d5b560b86647c44b42d8dc8ad049121d4da6

    • SHA512

      b2a00a13edb338ce5ae23a299a9304f20ebc02902267c0ac1778c6d854089760b96cc90384bea47dd5a797638a729c1f353923bb70cddfbd1cecd8a857714e43

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks