General

  • Target

    dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de

  • Size

    282KB

  • Sample

    220123-vtb87sgbfq

  • MD5

    31ed8e6e281221239957390ff0f3a19c

  • SHA1

    9ce73548886975eb003883638d42ad9fb8182da0

  • SHA256

    dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de

  • SHA512

    ee8ff1d2cbad53498a9e53ea72d7f0de71d7209a5ffd9923bfec33728fed4584b9e54d75e9bf1ed0b4428ecf3ae63a5215ca7cca81947ac915f0c9a1a450dae3

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de

    • Size

      282KB

    • MD5

      31ed8e6e281221239957390ff0f3a19c

    • SHA1

      9ce73548886975eb003883638d42ad9fb8182da0

    • SHA256

      dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de

    • SHA512

      ee8ff1d2cbad53498a9e53ea72d7f0de71d7209a5ffd9923bfec33728fed4584b9e54d75e9bf1ed0b4428ecf3ae63a5215ca7cca81947ac915f0c9a1a450dae3

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks