General
-
Target
PO_3421.msi
-
Size
2MB
-
Sample
220211-hzzkgacbe4
-
MD5
30a04930a6888a2df882478fef4a7ade
-
SHA1
c91b1b550c3a74840f3066e7a4b0fe08c37b7d2a
-
SHA256
1f7830f0117f694b87ae81caed022c82174f9a8d158a0b8e127154e17d1600cc
-
SHA512
b101b58533e61dd8fe8d27af36cb3c6300927286a51994bb7adbafac63ff20af61196660bc79f3f6ffef1e9975be8d06d9ed0c88891389abedcf823480565b49
Static task
static1
Behavioral task
behavioral1
Sample
PO_3421.msi
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PO_3421.msi
Resource
win10v2004-en-20220113
Malware Config
Extracted
arkei
Default
http://62.204.41.172/h3nwk7uvsH.php
Targets
-
-
Target
PO_3421.msi
-
Size
2MB
-
MD5
30a04930a6888a2df882478fef4a7ade
-
SHA1
c91b1b550c3a74840f3066e7a4b0fe08c37b7d2a
-
SHA256
1f7830f0117f694b87ae81caed022c82174f9a8d158a0b8e127154e17d1600cc
-
SHA512
b101b58533e61dd8fe8d27af36cb3c6300927286a51994bb7adbafac63ff20af61196660bc79f3f6ffef1e9975be8d06d9ed0c88891389abedcf823480565b49
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Matrix
Collection
Data from Local System
2Command and Control
Credential Access
Credentials in Files
2Defense Evasion
File Permissions Modification
1Discovery
Query Registry
4System Information Discovery
4Peripheral Device Discovery
2Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation