General

  • Target

    addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd

  • Size

    296KB

  • Sample

    220124-nw6r9seehq

  • MD5

    679d351b1f9c1fefe6fc04a4012af3cb

  • SHA1

    7d6c331eda2af3294f654f84fd186e9bb82324a0

  • SHA256

    addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd

  • SHA512

    9d76f5886cc0f8279ba5ca32fee4000e41bc482dd65e13728c398ed4f9dee3a5ff149eedc75be0ee60ab18485e526a9d5896a8b23f0997d1a421d02aa5fc51f8

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://homesteadr.link/ggate.php

Targets

    • Target

      addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd

    • Size

      296KB

    • MD5

      679d351b1f9c1fefe6fc04a4012af3cb

    • SHA1

      7d6c331eda2af3294f654f84fd186e9bb82324a0

    • SHA256

      addc9cc0f1a7e934056b99220a292abf64265369da9016be8e2b6249e4da86fd

    • SHA512

      9d76f5886cc0f8279ba5ca32fee4000e41bc482dd65e13728c398ed4f9dee3a5ff149eedc75be0ee60ab18485e526a9d5896a8b23f0997d1a421d02aa5fc51f8

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks