General

  • Target

    77f00d3c2cb698614cf12223450cd87372ba443d4d23741da3522ba0a2cb5613

  • Size

    296KB

  • Sample

    220124-w73hzshbgl

  • MD5

    2318f335bf473a3784c0d21f665f1636

  • SHA1

    22298901ce46a35ec1b95acd4911c8da8b304d2b

  • SHA256

    77f00d3c2cb698614cf12223450cd87372ba443d4d23741da3522ba0a2cb5613

  • SHA512

    dc7584054581c193ee68456c9d6894df183ecbaa373dd1b043eed075c1e143fe186e2ef0121bee7c4f70c86fefe7baf0826121063c4c5f29dc8a2da55f9f8cca

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://coin-file-file-19.com/tratata.php

Targets

    • Target

      77f00d3c2cb698614cf12223450cd87372ba443d4d23741da3522ba0a2cb5613

    • Size

      296KB

    • MD5

      2318f335bf473a3784c0d21f665f1636

    • SHA1

      22298901ce46a35ec1b95acd4911c8da8b304d2b

    • SHA256

      77f00d3c2cb698614cf12223450cd87372ba443d4d23741da3522ba0a2cb5613

    • SHA512

      dc7584054581c193ee68456c9d6894df183ecbaa373dd1b043eed075c1e143fe186e2ef0121bee7c4f70c86fefe7baf0826121063c4c5f29dc8a2da55f9f8cca

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks