General
-
Target
759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c
-
Size
223KB
-
Sample
220127-1dktasbdg9
-
MD5
14bca1da4beda8d691dadefba8a68569
-
SHA1
6b3c2322907e288e5d25df70829a447e0053775b
-
SHA256
759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c
-
SHA512
28436250eda80317bcf14102f0caff8600f9b3e2d2d8400ae8f572bce67f902b452e1bbfe3aa74f4f5367fa76279e8d9dcde978b839d8df2152a58b168c59f60
Static task
static1
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c
-
Size
223KB
-
MD5
14bca1da4beda8d691dadefba8a68569
-
SHA1
6b3c2322907e288e5d25df70829a447e0053775b
-
SHA256
759cee7467ffcee81cb170a1a9086a0371e51943f7cc7dee2d9e40570c9ead2c
-
SHA512
28436250eda80317bcf14102f0caff8600f9b3e2d2d8400ae8f572bce67f902b452e1bbfe3aa74f4f5367fa76279e8d9dcde978b839d8df2152a58b168c59f60
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-