General
-
Target
addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd
-
Size
296KB
-
Sample
220124-nw6r9seehq
-
MD5
679d351b1f9c1fefe6fc04a4012af3cb
-
SHA1
7d6c331eda2af3294f654f84fd186e9bb82324a0
-
SHA256
addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd
-
SHA512
9d76f5886cc0f8279ba5ca32fee4000e41bc482dd65e13728c398ed4f9dee3a5ff149eedc75be0ee60ab18485e526a9d5896a8b23f0997d1a421d02aa5fc51f8
Static task
static1
Malware Config
Extracted
arkei
Default
http://homesteadr.link/ggate.php
Targets
-
-
Target
addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd
-
Size
296KB
-
MD5
679d351b1f9c1fefe6fc04a4012af3cb
-
SHA1
7d6c331eda2af3294f654f84fd186e9bb82324a0
-
SHA256
addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd
-
SHA512
9d76f5886cc0f8279ba5ca32fee4000e41bc482dd65e13728c398ed4f9dee3a5ff149eedc75be0ee60ab18485e526a9d5896a8b23f0997d1a421d02aa5fc51f8
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-