54118ae981704768ef3943c42818b758.exe

General
Target

54118ae981704768ef3943c42818b758.exe

Size

337KB

Sample

220126-s1mx6sefaj

Score
10 /10
MD5

54118ae981704768ef3943c42818b758

SHA1

34268c031520d25d4be5df04b3b56bc5939d3b20

SHA256

e213fa14a7be007721a2d90d1b367827a4570493903b202b858f6fa9c89afede

SHA512

473149791007add30cd8442aafcc99297021782d120c18584dee68280987bde2aeed0d929699094a3b4f9b4faee725c6b13c3b0aada63eef17d1da5d95fedd27

Malware Config

Extracted

Family arkei
Botnet Default
C2

http://coin-file-file-19.com/tratata.php

Targets
Target

54118ae981704768ef3943c42818b758.exe

MD5

54118ae981704768ef3943c42818b758

Filesize

337KB

Score
10/10
SHA1

34268c031520d25d4be5df04b3b56bc5939d3b20

SHA256

e213fa14a7be007721a2d90d1b367827a4570493903b202b858f6fa9c89afede

SHA512

473149791007add30cd8442aafcc99297021782d120c18584dee68280987bde2aeed0d929699094a3b4f9b4faee725c6b13c3b0aada63eef17d1da5d95fedd27

Tags

Signatures

  • Arkei

    Description

    Arkei is an infostealer written in C++.

    Tags

  • Arkei Stealer Payload

    Tags

  • Downloads MZ/PE file

  • Deletes itself

  • Loads dropped DLL

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1