General
-
Target
6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6
-
Size
284KB
-
Sample
220124-fe7dgacbe4
-
MD5
c5889e8a01b50e70ad89406ee3902b0c
-
SHA1
f4284030787b06a89d125673ceb11ac72d026363
-
SHA256
6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6
-
SHA512
ef3f3330dde0fb58f9496ebddc1e6f15c2f4ec319ec75f550c323a3c70927980c878cec736bdd3649c8f15c50062d7ed2f7bb2db3672417d0ba6194bc8ec9a5c
Static task
static1
Malware Config
Extracted
arkei
Default
http://homesteadr.link/ggate.php
Targets
-
-
Target
6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6
-
Size
284KB
-
MD5
c5889e8a01b50e70ad89406ee3902b0c
-
SHA1
f4284030787b06a89d125673ceb11ac72d026363
-
SHA256
6412f5664701cd9fc3e94374eeef74e74bee2b940eca3da0c8f98cc5137c34d6
-
SHA512
ef3f3330dde0fb58f9496ebddc1e6f15c2f4ec319ec75f550c323a3c70927980c878cec736bdd3649c8f15c50062d7ed2f7bb2db3672417d0ba6194bc8ec9a5c
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
2Command and Control
Credential Access
Credentials in Files
2Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation