278f127fd5be93045598ce3e8b1b8154732b1b87876c39712951ba82aa733424

General
Target

278f127fd5be93045598ce3e8b1b8154732b1b87876c39712951ba82aa733424

Size

284KB

Sample

220124-bzwegshfaj

Score
10 /10
MD5

51366f65ae6218610e36e57300dd1880

SHA1

036111329167f2779f6d0b1637754b288411ae32

SHA256

278f127fd5be93045598ce3e8b1b8154732b1b87876c39712951ba82aa733424

SHA512

f743b7f306ecd8080d260e89b90d409557def23d1d3166730ad2ebbf5aa123a9940cc0476b739fc6a1dc7ffce99ad7848be906bf031330679df70ab08bfceda0

Malware Config

Extracted

Family arkei
Botnet Default
C2

http://coin-file-file-19.com/tratata.php

Targets
Target

278f127fd5be93045598ce3e8b1b8154732b1b87876c39712951ba82aa733424

MD5

51366f65ae6218610e36e57300dd1880

Filesize

284KB

Score
10/10
SHA1

036111329167f2779f6d0b1637754b288411ae32

SHA256

278f127fd5be93045598ce3e8b1b8154732b1b87876c39712951ba82aa733424

SHA512

f743b7f306ecd8080d260e89b90d409557def23d1d3166730ad2ebbf5aa123a9940cc0476b739fc6a1dc7ffce99ad7848be906bf031330679df70ab08bfceda0

Tags

Signatures

  • Arkei

    Description

    Arkei is an infostealer written in C++.

    Tags

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    Description

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    Tags

  • Arkei Stealer Payload

    Tags

  • Downloads MZ/PE file

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks