a84f132af3fe5d0c962f5f8d11704872d7171bd75d425dde3d182f01e249fe3b

General
Target

a84f132af3fe5d0c962f5f8d11704872d7171bd75d425dde3d182f01e249fe3b

Size

297KB

Sample

220125-tsrf3aafhq

Score
10 /10
MD5

1c9cebfc7dae1d1b75538ba7f496bbfb

SHA1

7ff87bbcc5c04386800985bf55b4373993e3f3d5

SHA256

a84f132af3fe5d0c962f5f8d11704872d7171bd75d425dde3d182f01e249fe3b

SHA512

1cd66e84f60a1b7bd7c205c17b2d608e20a91d260729de2ce0bcbbbc531aa948d9dc4f24ff2ad17ce76a2f99defe5ee1325dcf2e2844f47fb60658e0bee34aba

Malware Config

Extracted

Family arkei
Botnet Default
C2

http://coin-file-file-19.com/tratata.php

Targets
Target

a84f132af3fe5d0c962f5f8d11704872d7171bd75d425dde3d182f01e249fe3b

MD5

1c9cebfc7dae1d1b75538ba7f496bbfb

Filesize

297KB

Score
10/10
SHA1

7ff87bbcc5c04386800985bf55b4373993e3f3d5

SHA256

a84f132af3fe5d0c962f5f8d11704872d7171bd75d425dde3d182f01e249fe3b

SHA512

1cd66e84f60a1b7bd7c205c17b2d608e20a91d260729de2ce0bcbbbc531aa948d9dc4f24ff2ad17ce76a2f99defe5ee1325dcf2e2844f47fb60658e0bee34aba

Tags

Signatures

  • Arkei

    Description

    Arkei is an infostealer written in C++.

    Tags

  • suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    Description

    suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil

    Tags

  • Arkei Stealer Payload

    Tags

  • Downloads MZ/PE file

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks