General
-
Target
1a7038c0b12daeb68ce5e60eaf5b6b3a679d3be4bc8eb84b30f18212a573ea14
-
Size
337KB
-
Sample
220126-f3r9fshbg6
-
MD5
70dc9ac343727bd6b7da3acdee2485fb
-
SHA1
6899ad1ba798b4d2aebfe919401c41a141d0e758
-
SHA256
1a7038c0b12daeb68ce5e60eaf5b6b3a679d3be4bc8eb84b30f18212a573ea14
-
SHA512
9c7581a6e36133af2ad1084701f5b5c2f70b8fddd3319c4595499df2f9468c0439bc63c72e9ac54bb526c5c5fd2b2d3f799773bf02ae625a862c96e01a57047d
Static task
static1
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
1a7038c0b12daeb68ce5e60eaf5b6b3a679d3be4bc8eb84b30f18212a573ea14
-
Size
337KB
-
MD5
70dc9ac343727bd6b7da3acdee2485fb
-
SHA1
6899ad1ba798b4d2aebfe919401c41a141d0e758
-
SHA256
1a7038c0b12daeb68ce5e60eaf5b6b3a679d3be4bc8eb84b30f18212a573ea14
-
SHA512
9c7581a6e36133af2ad1084701f5b5c2f70b8fddd3319c4595499df2f9468c0439bc63c72e9ac54bb526c5c5fd2b2d3f799773bf02ae625a862c96e01a57047d
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-