General

  • Target

    8c3ba6d3a6f3968bbcae8a8ae035d0b1ab8425ca4797900f43d996a2c1839432

  • Size

    12KB

  • Sample

    220723-a83pgsahg5

  • MD5

    daeed15b76005f0165fbd4781e47b2f6

  • SHA1

    148fd184577272f94f1f54e27805d795524c1f85

  • SHA256

    8c3ba6d3a6f3968bbcae8a8ae035d0b1ab8425ca4797900f43d996a2c1839432

  • SHA512

    ef0e5bfc7447e0c878eca60724c63682ac8479de431097db5ca96d4ed7fd8e26657160038431530111cadc843ba7b50638baeca76d130e29a7a829b21c75d1cd

Malware Config

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      8c3ba6d3a6f3968bbcae8a8ae035d0b1ab8425ca4797900f43d996a2c1839432

    • Size

      12KB

    • MD5

      daeed15b76005f0165fbd4781e47b2f6

    • SHA1

      148fd184577272f94f1f54e27805d795524c1f85

    • SHA256

      8c3ba6d3a6f3968bbcae8a8ae035d0b1ab8425ca4797900f43d996a2c1839432

    • SHA512

      ef0e5bfc7447e0c878eca60724c63682ac8479de431097db5ca96d4ed7fd8e26657160038431530111cadc843ba7b50638baeca76d130e29a7a829b21c75d1cd

    • Arkei

      Arkei is an infostealer written in C++.

    • suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

      suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

    • suricata: ET MALWARE Generic gate .php GET with minimal headers

      suricata: ET MALWARE Generic gate .php GET with minimal headers

    • suricata: ET MALWARE Possible Windows executable sent when remote host claims to send html content

      suricata: ET MALWARE Possible Windows executable sent when remote host claims to send html content

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks