General
-
Target
28d8ebe7523287d8ebde584a18db75734cf6779f3461340f8acf053874c87716
-
Size
270KB
-
Sample
220122-3rzwgsdhal
-
MD5
d7b9e4fc502e806e7430f132352f67aa
-
SHA1
4506449f1d7dace24ffe9dfe5b452c44c77dcd59
-
SHA256
28d8ebe7523287d8ebde584a18db75734cf6779f3461340f8acf053874c87716
-
SHA512
9088de8aaca3e3cbf9acba023a88c2d791fa1992eecaf874856809d1d87a4dd96b044b2a3b7df242c3dc8579f9b8f6b1cc4b1a567080e8e27cb5556c44450339
Static task
static1
Behavioral task
behavioral1
Sample
28d8ebe7523287d8ebde584a18db75734cf6779f3461340f8acf053874c87716.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Targets
-
-
Target
28d8ebe7523287d8ebde584a18db75734cf6779f3461340f8acf053874c87716
-
Size
270KB
-
MD5
d7b9e4fc502e806e7430f132352f67aa
-
SHA1
4506449f1d7dace24ffe9dfe5b452c44c77dcd59
-
SHA256
28d8ebe7523287d8ebde584a18db75734cf6779f3461340f8acf053874c87716
-
SHA512
9088de8aaca3e3cbf9acba023a88c2d791fa1992eecaf874856809d1d87a4dd96b044b2a3b7df242c3dc8579f9b8f6b1cc4b1a567080e8e27cb5556c44450339
Score10/10-
Arkei Stealer Payload
-
Sets service image path in registry
-