Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    23-01-2022 01:50

General

  • Target

    b6ec92bdd8d99320ab901f4f7fd4580bc8a464164a4aeb80baebd5f2aef77cde.exe

  • Size

    270KB

  • MD5

    0908af4cc110bd29e2eb28ceb205ac10

  • SHA1

    c3834b6e26735f1afbcd74c5a2e09c7a1b732798

  • SHA256

    b6ec92bdd8d99320ab901f4f7fd4580bc8a464164a4aeb80baebd5f2aef77cde

  • SHA512

    910d3d93fb0d8a0481f6438f3d54e0cfd54bfa4060c2e7f3372ae8cb8174ef0af9784519b417b53a306c3912eca17e90f60ff43ace41e3c78059ec5208e600e8

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://file-file-host4.com/tratata.php

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Arkei Stealer Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6ec92bdd8d99320ab901f4f7fd4580bc8a464164a4aeb80baebd5f2aef77cde.exe
    "C:\Users\Admin\AppData\Local\Temp\b6ec92bdd8d99320ab901f4f7fd4580bc8a464164a4aeb80baebd5f2aef77cde.exe"
    1⤵
      PID:528

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/528-115-0x0000000000770000-0x0000000000781000-memory.dmp
      Filesize

      68KB

    • memory/528-116-0x0000000000790000-0x00000000007AC000-memory.dmp
      Filesize

      112KB

    • memory/528-117-0x0000000000400000-0x000000000044A000-memory.dmp
      Filesize

      296KB