General

  • Target

    bda5e7f2bb6adf797baf3da757dfb16689c9739f15015741a2b6b381d5a54ad7

  • Size

    296KB

  • Sample

    220124-q9mmnafabk

  • MD5

    d968b1d4268f9278852995885f754704

  • SHA1

    379f501768415112d86633d77693ba70b1e7ce2a

  • SHA256

    bda5e7f2bb6adf797baf3da757dfb16689c9739f15015741a2b6b381d5a54ad7

  • SHA512

    2d2834f3a7b45a63dd605ba5da74c959e8f3b36f4bc9f1ad3c3ec5e67b59507fe71970d33bd6720d0c2a82bad82d0eed5e47bcd26c90c9fa93d9822389ba36f8

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://coin-file-file-19.com/tratata.php

Targets

    • Target

      bda5e7f2bb6adf797baf3da757dfb16689c9739f15015741a2b6b381d5a54ad7

    • Size

      296KB

    • MD5

      d968b1d4268f9278852995885f754704

    • SHA1

      379f501768415112d86633d77693ba70b1e7ce2a

    • SHA256

      bda5e7f2bb6adf797baf3da757dfb16689c9739f15015741a2b6b381d5a54ad7

    • SHA512

      2d2834f3a7b45a63dd605ba5da74c959e8f3b36f4bc9f1ad3c3ec5e67b59507fe71970d33bd6720d0c2a82bad82d0eed5e47bcd26c90c9fa93d9822389ba36f8

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks