General

  • Target

    Anwuqahpedbnnlsgekmacy.bin.zip

  • Size

    568KB

  • Sample

    220707-fcfsqsfdb9

  • MD5

    c1063f2c482b8d51c2adc6724ba7291b

  • SHA1

    4f1a23bf912e95989e56f766a7650552886694d7

  • SHA256

    75c6768b31d4102a990350bd2edf55dc5616217bd26cfb3d8b0395c59cdfa1b5

  • SHA512

    b2a2ae8c6f41feca8e992e2a4b3dad437fece0daa97a549bd422148ca5a42288e5a0de5311d47956c204c161288ecd0db971a0cae4274c8b1df380507174d2b0

Malware Config

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      Anwuqahpedbnnlsgekmacy.bin

    • Size

      576KB

    • MD5

      6033fc2cf6e73f5ca5cf76206d4f2232

    • SHA1

      a01fae21dfd9319f332c3cb717f8a8467514e8ce

    • SHA256

      eaa5fb40a306c308eead3848fe6b4c16c7b271ddc63a89cc876b54248f8b1d08

    • SHA512

      795df2b76dd23c09e5e90d1b5f2f4b88d1be8b44eb072001fb1bdfca210a6106a38cdafdc4df4e429f7acbbf5c8be3fe093e906280571acbf4458c9c6563233a

    • Arkei

      Arkei is an infostealer written in C++.

    • suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

      suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

    • suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

      suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks