General

  • Target

    ba4d691fccd7047d36318766d019732807f993f366c0caca600dc8ce6162d5c8

  • Size

    522KB

  • Sample

    220629-snh4fsaedq

  • MD5

    82e2fb19440f6f3807094a3094240858

  • SHA1

    1db001a081331504300c33afafb1a36428e6166d

  • SHA256

    ba4d691fccd7047d36318766d019732807f993f366c0caca600dc8ce6162d5c8

  • SHA512

    e9f7aba46904750997955e10f26c4de9eedd5b91c8ee82b12732acf88e8c07003ea4e2878ffc454fdbe298ad4be1e21685160fbd836bac898e51a3044123a155

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      ba4d691fccd7047d36318766d019732807f993f366c0caca600dc8ce6162d5c8

    • Size

      522KB

    • MD5

      82e2fb19440f6f3807094a3094240858

    • SHA1

      1db001a081331504300c33afafb1a36428e6166d

    • SHA256

      ba4d691fccd7047d36318766d019732807f993f366c0caca600dc8ce6162d5c8

    • SHA512

      e9f7aba46904750997955e10f26c4de9eedd5b91c8ee82b12732acf88e8c07003ea4e2878ffc454fdbe298ad4be1e21685160fbd836bac898e51a3044123a155

    Score
    10/10
    • Arkei

      Arkei is an infostealer written in C++.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks