General

  • Target

    41cdcb518a6968e5f6c2a7e5cc50dcbe28b0d9499912be553f8e0248204b0701

  • Size

    282KB

  • Sample

    220123-qb9drsgacj

  • MD5

    a9df6c265de4a8d798374ade1bee708d

  • SHA1

    8ee5bdf58db22c16b6b574734dad04fac74ff4b3

  • SHA256

    41cdcb518a6968e5f6c2a7e5cc50dcbe28b0d9499912be553f8e0248204b0701

  • SHA512

    483f8289abad726569c09f6ab038f6a45211cad8ae9412c054063dcdc826e47c19f2949e8e23ee2d384b8a37bfa0258f8b9a9e0f84920222a1053e7734f1b857

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://coin-file-file-19.com/tratata.php

Targets

    • Target

      41cdcb518a6968e5f6c2a7e5cc50dcbe28b0d9499912be553f8e0248204b0701

    • Size

      282KB

    • MD5

      a9df6c265de4a8d798374ade1bee708d

    • SHA1

      8ee5bdf58db22c16b6b574734dad04fac74ff4b3

    • SHA256

      41cdcb518a6968e5f6c2a7e5cc50dcbe28b0d9499912be553f8e0248204b0701

    • SHA512

      483f8289abad726569c09f6ab038f6a45211cad8ae9412c054063dcdc826e47c19f2949e8e23ee2d384b8a37bfa0258f8b9a9e0f84920222a1053e7734f1b857

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks