General
-
Target
dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de
-
Size
282KB
-
Sample
220123-vtb87sgbfq
-
MD5
31ed8e6e281221239957390ff0f3a19c
-
SHA1
9ce73548886975eb003883638d42ad9fb8182da0
-
SHA256
dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de
-
SHA512
ee8ff1d2cbad53498a9e53ea72d7f0de71d7209a5ffd9923bfec33728fed4584b9e54d75e9bf1ed0b4428ecf3ae63a5215ca7cca81947ac915f0c9a1a450dae3
Static task
static1
Malware Config
Extracted
arkei
Default
http://homesteadr.link/ggate.php
Targets
-
-
Target
dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de
-
Size
282KB
-
MD5
31ed8e6e281221239957390ff0f3a19c
-
SHA1
9ce73548886975eb003883638d42ad9fb8182da0
-
SHA256
dbafd75eec35bab9038f24950ed1b517c020e0c5626d0b63f7c4dc236178b4de
-
SHA512
ee8ff1d2cbad53498a9e53ea72d7f0de71d7209a5ffd9923bfec33728fed4584b9e54d75e9bf1ed0b4428ecf3ae63a5215ca7cca81947ac915f0c9a1a450dae3
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-