General

  • Target

    6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6

  • Size

    284KB

  • Sample

    220124-fe7dgacbe4

  • MD5

    c5889e8a01b50e70ad89406ee3902b0c

  • SHA1

    f4284030787b06a89d125673ceb11ac72d026363

  • SHA256

    6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6

  • SHA512

    ef3f3330dde0fb58f9496ebddc1e6f15c2f4ec319ec75f550c323a3c70927980c878cec736bdd3649c8f15c50062d7ed2f7bb2db3672417d0ba6194bc8ec9a5c

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6

    • Size

      284KB

    • MD5

      c5889e8a01b50e70ad89406ee3902b0c

    • SHA1

      f4284030787b06a89d125673ceb11ac72d026363

    • SHA256

      6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6

    • SHA512

      ef3f3330dde0fb58f9496ebddc1e6f15c2f4ec319ec75f550c323a3c70927980c878cec736bdd3649c8f15c50062d7ed2f7bb2db3672417d0ba6194bc8ec9a5c

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks