General
-
Target
1e7170d4ef913622cbda1928f911e2b6c47d11ad657e0fe80ceeaf1ff86b9b76
-
Size
360KB
-
Sample
220128-ejba6afha2
-
MD5
2a2b76b47d5325efa62d74b75ec30412
-
SHA1
68e0f3a5791b4ac8310f2a72a6ecce64530e2982
-
SHA256
1e7170d4ef913622cbda1928f911e2b6c47d11ad657e0fe80ceeaf1ff86b9b76
-
SHA512
77178f91c0bf84ee149cdda1323d31ded7b5e3ce6f1bc3a6232f8f9b8e2a5ea881844c03eb1d785ad41069b3c66be274d4ac188803a52f65f5e4be09385d224f
Static task
static1
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
1e7170d4ef913622cbda1928f911e2b6c47d11ad657e0fe80ceeaf1ff86b9b76
-
Size
360KB
-
MD5
2a2b76b47d5325efa62d74b75ec30412
-
SHA1
68e0f3a5791b4ac8310f2a72a6ecce64530e2982
-
SHA256
1e7170d4ef913622cbda1928f911e2b6c47d11ad657e0fe80ceeaf1ff86b9b76
-
SHA512
77178f91c0bf84ee149cdda1323d31ded7b5e3ce6f1bc3a6232f8f9b8e2a5ea881844c03eb1d785ad41069b3c66be274d4ac188803a52f65f5e4be09385d224f
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-