General

  • Target

    d13f1f8d80309d8fce86516867cee58436ff0d6596edc1a66c6267cf39f8acd7

  • Size

    282KB

  • Sample

    220123-rvtyvsgbc8

  • MD5

    8bbd375a31c80d7d0a799d21c1e15249

  • SHA1

    c5c4dff28b52f44753e6066f4c660865beb47ced

  • SHA256

    d13f1f8d80309d8fce86516867cee58436ff0d6596edc1a66c6267cf39f8acd7

  • SHA512

    207b057d38e4459d4fc60e9c281e3db39d1e3c445d1e6a69e5926290b855f333eebf689ba7b4e06f43aa408b8da6195ab78dbda4741e294579594b7d9c978b0d

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      d13f1f8d80309d8fce86516867cee58436ff0d6596edc1a66c6267cf39f8acd7

    • Size

      282KB

    • MD5

      8bbd375a31c80d7d0a799d21c1e15249

    • SHA1

      c5c4dff28b52f44753e6066f4c660865beb47ced

    • SHA256

      d13f1f8d80309d8fce86516867cee58436ff0d6596edc1a66c6267cf39f8acd7

    • SHA512

      207b057d38e4459d4fc60e9c281e3db39d1e3c445d1e6a69e5926290b855f333eebf689ba7b4e06f43aa408b8da6195ab78dbda4741e294579594b7d9c978b0d

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks