General
-
Target
8097c0335c0cccc79d2e1bc41c2e8abd1a3853207a55ee5a91a3b2256b4f000b
-
Size
282KB
-
Sample
220123-nwbl5agab8
-
MD5
8a43089d15961c6c339967ec22426b5b
-
SHA1
d326f77ae2957f92b5069b9d720c9e0d04cb09b5
-
SHA256
8097c0335c0cccc79d2e1bc41c2e8abd1a3853207a55ee5a91a3b2256b4f000b
-
SHA512
4966106498ed43ea4d70b8a61b755882ef5090e480ac484e2bcd5737b4a824d8df9a38a95f7ca26f8eb17ec897dff3c42a30149c7645635b45a6f52a9a65826c
Static task
static1
Malware Config
Extracted
arkei
Default
http://homesteadr.link/ggate.php
Targets
-
-
Target
8097c0335c0cccc79d2e1bc41c2e8abd1a3853207a55ee5a91a3b2256b4f000b
-
Size
282KB
-
MD5
8a43089d15961c6c339967ec22426b5b
-
SHA1
d326f77ae2957f92b5069b9d720c9e0d04cb09b5
-
SHA256
8097c0335c0cccc79d2e1bc41c2e8abd1a3853207a55ee5a91a3b2256b4f000b
-
SHA512
4966106498ed43ea4d70b8a61b755882ef5090e480ac484e2bcd5737b4a824d8df9a38a95f7ca26f8eb17ec897dff3c42a30149c7645635b45a6f52a9a65826c
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-