General

  • Target

    f8daaca980041325bcf4f5ab4f76958baeea4199ed2694351a9ba7b866796804

  • Size

    284KB

  • Sample

    220124-d37yssbcgk

  • MD5

    3193df0117560ee85ff71f3e6664050c

  • SHA1

    5b0fff61adf2e06582449139ff8e81373bd92c63

  • SHA256

    f8daaca980041325bcf4f5ab4f76958baeea4199ed2694351a9ba7b866796804

  • SHA512

    ca52b5a3adcc514048ed87988a20d7f5c8a009c3326b45c2d74134f2c51332abd0e184aef76b7eeda62fe93724d1d8dc79427b6e757927a7cfc59f4525bdd951

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      f8daaca980041325bcf4f5ab4f76958baeea4199ed2694351a9ba7b866796804

    • Size

      284KB

    • MD5

      3193df0117560ee85ff71f3e6664050c

    • SHA1

      5b0fff61adf2e06582449139ff8e81373bd92c63

    • SHA256

      f8daaca980041325bcf4f5ab4f76958baeea4199ed2694351a9ba7b866796804

    • SHA512

      ca52b5a3adcc514048ed87988a20d7f5c8a009c3326b45c2d74134f2c51332abd0e184aef76b7eeda62fe93724d1d8dc79427b6e757927a7cfc59f4525bdd951

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks