General

  • Target

    582d3ef01508bca442c17fe30103052762c517978ce51e23346e6a1f7dc2e2e1

  • Size

    33.1MB

  • Sample

    220626-xsj9jaeaf4

  • MD5

    a01326f71161ff1c61298c3e5e880f4f

  • SHA1

    d95fe7c087d1075d94cb09d8278ab90497b32713

  • SHA256

    582d3ef01508bca442c17fe30103052762c517978ce51e23346e6a1f7dc2e2e1

  • SHA512

    0e5d514ef09cdafdec5739146edd4e6a3289e4a47f269ba6e051a412bcb09709c52c15c314653efd9a71211cdd4dfaba2163bc502ab947647ec18490b8d63bbc

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://93.159.221.78/EpkC2Ze5OX.php

Targets

    • Target

      582d3ef01508bca442c17fe30103052762c517978ce51e23346e6a1f7dc2e2e1

    • Size

      33.1MB

    • MD5

      a01326f71161ff1c61298c3e5e880f4f

    • SHA1

      d95fe7c087d1075d94cb09d8278ab90497b32713

    • SHA256

      582d3ef01508bca442c17fe30103052762c517978ce51e23346e6a1f7dc2e2e1

    • SHA512

      0e5d514ef09cdafdec5739146edd4e6a3289e4a47f269ba6e051a412bcb09709c52c15c314653efd9a71211cdd4dfaba2163bc502ab947647ec18490b8d63bbc

    • Arkei

      Arkei is an infostealer written in C++.

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

2
T1120

System Information Discovery

2
T1082

Tasks