General
-
Target
63e6ab57f0afaf29ed8391497769946ae87d57338af83624cecbab41821911ff
-
Size
284KB
-
Sample
220123-2jed5sgdfj
-
MD5
2f2fc6756edb73f5e84d8443f21180f4
-
SHA1
9dd062e8c434e50d6409fa2d9492fd662c81386c
-
SHA256
63e6ab57f0afaf29ed8391497769946ae87d57338af83624cecbab41821911ff
-
SHA512
0deaf7da5bc87576984690330faec8ffe4cb1d1d4a428a00f3893b53ddcb086610c6e2d76109e06a348d59c0cef63fcc91934d8caec2b5dbb39d3e761e0377ee
Static task
static1
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
63e6ab57f0afaf29ed8391497769946ae87d57338af83624cecbab41821911ff
-
Size
284KB
-
MD5
2f2fc6756edb73f5e84d8443f21180f4
-
SHA1
9dd062e8c434e50d6409fa2d9492fd662c81386c
-
SHA256
63e6ab57f0afaf29ed8391497769946ae87d57338af83624cecbab41821911ff
-
SHA512
0deaf7da5bc87576984690330faec8ffe4cb1d1d4a428a00f3893b53ddcb086610c6e2d76109e06a348d59c0cef63fcc91934d8caec2b5dbb39d3e761e0377ee
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-