General

  • Target

    fd6536e6b9ecad9a6bd9865152b524f2fcb44611f17bc56ee646a0a563df2cb3

  • Size

    297KB

  • Sample

    220125-ssledahghl

  • MD5

    be5267dc7cf1a68a57f5ad058264564c

  • SHA1

    074f896a2f95868bc397f9ae68c12894e63668d5

  • SHA256

    fd6536e6b9ecad9a6bd9865152b524f2fcb44611f17bc56ee646a0a563df2cb3

  • SHA512

    519c1d63d59e2d75af2cc3785a05d3dfc4fb2cb1f97e36701b9ed01ddfd85f1bb924b4150564920eb685a6e7a4b703e749eee75a6dc48366dd305b9eafb38fd4

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://coin-file-file-19.com/tratata.php

Targets

    • Target

      fd6536e6b9ecad9a6bd9865152b524f2fcb44611f17bc56ee646a0a563df2cb3

    • Size

      297KB

    • MD5

      be5267dc7cf1a68a57f5ad058264564c

    • SHA1

      074f896a2f95868bc397f9ae68c12894e63668d5

    • SHA256

      fd6536e6b9ecad9a6bd9865152b524f2fcb44611f17bc56ee646a0a563df2cb3

    • SHA512

      519c1d63d59e2d75af2cc3785a05d3dfc4fb2cb1f97e36701b9ed01ddfd85f1bb924b4150564920eb685a6e7a4b703e749eee75a6dc48366dd305b9eafb38fd4

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks