General

  • Target

    759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c

  • Size

    223KB

  • Sample

    220127-1dktasbdg9

  • MD5

    14bca1da4beda8d691dadefba8a68569

  • SHA1

    6b3c2322907e288e5d25df70829a447e0053775b

  • SHA256

    759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c

  • SHA512

    28436250eda80317bcf14102f0caff8600f9b3e2d2d8400ae8f572bce67f902b452e1bbfe3aa74f4f5367fa76279e8d9dcde978b839d8df2152a58b168c59f60

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://coin-file-file-19.com/tratata.php

Targets

    • Target

      759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c

    • Size

      223KB

    • MD5

      14bca1da4beda8d691dadefba8a68569

    • SHA1

      6b3c2322907e288e5d25df70829a447e0053775b

    • SHA256

      759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c

    • SHA512

      28436250eda80317bcf14102f0caff8600f9b3e2d2d8400ae8f572bce67f902b452e1bbfe3aa74f4f5367fa76279e8d9dcde978b839d8df2152a58b168c59f60

    • Arkei

      Arkei is an infostealer written in C++.

    • Arkei Stealer Payload

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks