General

  • Target

    cheat.exe

  • Size

    2.5MB

  • Sample

    220719-pk572acaf8

  • MD5

    09f2b519e22c52721d33d5c3c0ac1f5e

  • SHA1

    b451e08f7d58118cf62c87f426dd95dda5aabd3e

  • SHA256

    e45414a2f8f7ca67e5438949f1ae1b6e0470007bcd8a55eb058cf87f6b078639

  • SHA512

    2cdf51fb04c5fae673d6d20cb3229e8c3fda932bf5a4ff167465d0d99407f1183792bb98dbf25d154d1fbc174a78e52da5bf38fae6fb82b6498fc2e50a6c1c5f

Malware Config

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      cheat.exe

    • Size

      2.5MB

    • MD5

      09f2b519e22c52721d33d5c3c0ac1f5e

    • SHA1

      b451e08f7d58118cf62c87f426dd95dda5aabd3e

    • SHA256

      e45414a2f8f7ca67e5438949f1ae1b6e0470007bcd8a55eb058cf87f6b078639

    • SHA512

      2cdf51fb04c5fae673d6d20cb3229e8c3fda932bf5a4ff167465d0d99407f1183792bb98dbf25d154d1fbc174a78e52da5bf38fae6fb82b6498fc2e50a6c1c5f

    • Arkei

      Arkei is an infostealer written in C++.

    • suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

      suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

    • suricata: ET MALWARE Win32/Vidar Variant/Mars CnC Activity (GET)

      suricata: ET MALWARE Win32/Vidar Variant/Mars CnC Activity (GET)

    • suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

      suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks