728ea8a079304738242507b06624250b.exe

General
Target

728ea8a079304738242507b06624250b.exe

Size

336KB

Sample

220126-rc975adhh5

Score
10 /10
MD5

728ea8a079304738242507b06624250b

SHA1

738d80874e0d46f910482c7291eb6db07692de23

SHA256

0b32637010737e98ee8d1eb73537d7747d870e44e4c5e17d7ea562cf71605da8

SHA512

04c6c8eb98ac610c3c08ff6dd09c272f416c764f6d551de59e259ec9348aac067f07323ecb8a532e6cccc4dcea232471e3e59bd92d56096b5b9ef9e8998c8108

Malware Config

Extracted

Family arkei
Botnet Default
C2

http://coin-file-file-19.com/tratata.php

Targets
Target

728ea8a079304738242507b06624250b.exe

MD5

728ea8a079304738242507b06624250b

Filesize

336KB

Score
10/10
SHA1

738d80874e0d46f910482c7291eb6db07692de23

SHA256

0b32637010737e98ee8d1eb73537d7747d870e44e4c5e17d7ea562cf71605da8

SHA512

04c6c8eb98ac610c3c08ff6dd09c272f416c764f6d551de59e259ec9348aac067f07323ecb8a532e6cccc4dcea232471e3e59bd92d56096b5b9ef9e8998c8108

Tags

Signatures

  • Arkei

    Description

    Arkei is an infostealer written in C++.

    Tags

  • Arkei Stealer Payload

    Tags

  • Downloads MZ/PE file

  • Deletes itself

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1