General
-
Target
8c4f4656118f126865f80f7f510d5b1dc1fa955c03f79b471607ac160cfa9fa9
-
Size
282KB
-
Sample
220123-z7adzsgea3
-
MD5
2d0a5fad8caaa7abea26b3736a0c3bd4
-
SHA1
813a73e6fc02bcfa5f44324ec4a145f722cc42d6
-
SHA256
8c4f4656118f126865f80f7f510d5b1dc1fa955c03f79b471607ac160cfa9fa9
-
SHA512
b37f43616a3b071a707ff740ce4d8200387ff71e34926ddd7b393863c02d9ab3ee5391c9fc49e99deec943e822c980209ba9a0e7091f9d6240c4758b9cd61c03
Static task
static1
Malware Config
Extracted
arkei
Default
http://homesteadr.link/ggate.php
Targets
-
-
Target
8c4f4656118f126865f80f7f510d5b1dc1fa955c03f79b471607ac160cfa9fa9
-
Size
282KB
-
MD5
2d0a5fad8caaa7abea26b3736a0c3bd4
-
SHA1
813a73e6fc02bcfa5f44324ec4a145f722cc42d6
-
SHA256
8c4f4656118f126865f80f7f510d5b1dc1fa955c03f79b471607ac160cfa9fa9
-
SHA512
b37f43616a3b071a707ff740ce4d8200387ff71e34926ddd7b393863c02d9ab3ee5391c9fc49e99deec943e822c980209ba9a0e7091f9d6240c4758b9cd61c03
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-