General
-
Target
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0
-
Size
350KB
-
Sample
220127-phtffschc2
-
MD5
b55890d016a3e0c6e7f4ba2e49ab7e43
-
SHA1
8e1565a321d0630957bc65e0bdaae59b6a3671b7
-
SHA256
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0
-
SHA512
42876920445bccf5d32cb2be28ac546dd45cbce0ef1616b1800f5cd97a93c47bd27eafb619ccbab82b38a3707019210101fd989b20615c2f247c762671904f50
Static task
static1
Behavioral task
behavioral1
Sample
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0.exe
Resource
win7-en-20211208
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0
-
Size
350KB
-
MD5
b55890d016a3e0c6e7f4ba2e49ab7e43
-
SHA1
8e1565a321d0630957bc65e0bdaae59b6a3671b7
-
SHA256
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0
-
SHA512
42876920445bccf5d32cb2be28ac546dd45cbce0ef1616b1800f5cd97a93c47bd27eafb619ccbab82b38a3707019210101fd989b20615c2f247c762671904f50
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-