General

  • Target

    028adfdfe2ca971c48d9e0f0714400e8c729eecb20643871552ddb4072578adb

  • Size

    734KB

  • Sample

    220528-ek4n4acccq

  • MD5

    fd5b5cc293d372853c023c7b0ee5b3b4

  • SHA1

    d07d60444b165d75dc396aaf9ea4b56c509545b8

  • SHA256

    028adfdfe2ca971c48d9e0f0714400e8c729eecb20643871552ddb4072578adb

  • SHA512

    96c5af7e4f01184d7999a51638e3301b290aa24afdffb145d575901186073db1512c3c7df9b5da0772d64b0ab2c64c60ba50cb4ab82fd95a6119616ad4fddd8f

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://timebound.ug/pps.ps1

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      028adfdfe2ca971c48d9e0f0714400e8c729eecb20643871552ddb4072578adb

    • Size

      734KB

    • MD5

      fd5b5cc293d372853c023c7b0ee5b3b4

    • SHA1

      d07d60444b165d75dc396aaf9ea4b56c509545b8

    • SHA256

      028adfdfe2ca971c48d9e0f0714400e8c729eecb20643871552ddb4072578adb

    • SHA512

      96c5af7e4f01184d7999a51638e3301b290aa24afdffb145d575901186073db1512c3c7df9b5da0772d64b0ab2c64c60ba50cb4ab82fd95a6119616ad4fddd8f

    • Arkei

      Arkei is an infostealer written in C++.

    • suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

      suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

    • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

      suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    • suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

      suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

    • suricata: ET MALWARE Windows executable base64 encoded

      suricata: ET MALWARE Windows executable base64 encoded

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks