Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
23-01-2022 01:50
Static task
static1
General
-
Target
b6ec92bdd8d99320ab901f4f7fd4580bc8a464164a4aeb80baebd5f2aef77cde.exe
-
Size
270KB
-
MD5
0908af4cc110bd29e2eb28ceb205ac10
-
SHA1
c3834b6e26735f1afbcd74c5a2e09c7a1b732798
-
SHA256
b6ec92bdd8d99320ab901f4f7fd4580bc8a464164a4aeb80baebd5f2aef77cde
-
SHA512
910d3d93fb0d8a0481f6438f3d54e0cfd54bfa4060c2e7f3372ae8cb8174ef0af9784519b417b53a306c3912eca17e90f60ff43ace41e3c78059ec5208e600e8
Malware Config
Extracted
Family
arkei
Botnet
Default
C2
http://file-file-host4.com/tratata.php
Signatures
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/528-116-0x0000000000790000-0x00000000007AC000-memory.dmp family_arkei behavioral1/memory/528-117-0x0000000000400000-0x000000000044A000-memory.dmp family_arkei