General
-
Target
4733535972392960.zip
-
Size
192KB
-
Sample
220128-r73frsfcf5
-
MD5
63bebd41527de7353cc0f7d23b00d0eb
-
SHA1
c4864342ae4aa162f883a2de72bf594296d9b1c0
-
SHA256
a20d18e3f14f1ee44840c32374c727c8049e69d8b0944d719c844cadf70f1de9
-
SHA512
42c091c7e726487aed399580a57893b93ed728f3a04d70ef69e33d056c7c9984150efd1b9f5057a6fa317a136fc737a34dfa48669ece8f95385be84ad81cd31c
Static task
static1
Behavioral task
behavioral1
Sample
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0.exe
Resource
win7-en-20211208
Malware Config
Extracted
arkei
Default
http://coin-file-file-19.com/tratata.php
Targets
-
-
Target
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0
-
Size
350KB
-
MD5
b55890d016a3e0c6e7f4ba2e49ab7e43
-
SHA1
8e1565a321d0630957bc65e0bdaae59b6a3671b7
-
SHA256
adc5d511e576888aaed5f7e13b6df04f1b733e034bf34344be1dc0e6286dc5a0
-
SHA512
42876920445bccf5d32cb2be28ac546dd45cbce0ef1616b1800f5cd97a93c47bd27eafb619ccbab82b38a3707019210101fd989b20615c2f247c762671904f50
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-