General
-
Target
173ec9344e1ee75948571b2c9f2236c5a04b7084c25b0b21456b9bcdf6327deb
-
Size
350KB
-
Sample
220125-v3x72acbb2
-
MD5
78801f7bc3f1e7f314400d08dbd53511
-
SHA1
b385bfeda4a395e477f8110f434ea8f9a50e68d3
-
SHA256
173ec9344e1ee75948571b2c9f2236c5a04b7084c25b0b21456b9bcdf6327deb
-
SHA512
0c245bbc632a907092dab0d20f4c7b1a7cbd53078bba2cee56cea5a559b30f0b6fe61355d2e354bd39ac102b41c5e4b0330b0b21a4ac9015b40fc22c1aecfdf6
Static task
static1
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
173ec9344e1ee75948571b2c9f2236c5a04b7084c25b0b21456b9bcdf6327deb
-
Size
350KB
-
MD5
78801f7bc3f1e7f314400d08dbd53511
-
SHA1
b385bfeda4a395e477f8110f434ea8f9a50e68d3
-
SHA256
173ec9344e1ee75948571b2c9f2236c5a04b7084c25b0b21456b9bcdf6327deb
-
SHA512
0c245bbc632a907092dab0d20f4c7b1a7cbd53078bba2cee56cea5a559b30f0b6fe61355d2e354bd39ac102b41c5e4b0330b0b21a4ac9015b40fc22c1aecfdf6
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Matrix
Collection
Data from Local System
2Command and Control
Credential Access
Credentials in Files
2Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation