General

  • Target

    03e81c8df40db6549e905d8832fa1b80.exe

  • Size

    359KB

  • Sample

    220731-q3jbnafhb7

  • MD5

    03e81c8df40db6549e905d8832fa1b80

  • SHA1

    8653cebf8079fa38d845d12e424bcde4afd625b4

  • SHA256

    d98129981f18ffdf2db5edd0fc09442cc35ac1458971ca0ed14fe58dcd0dd3e0

  • SHA512

    b2999496aa5eb2ca90603a458d96523fc5795365c86e71d5a03cf79b2764ec572d4f1da15207836a78ec0df1b703b0efad46643945ffd5225c607abe5327c9e0

Malware Config

Extracted

Family

arkei

Botnet

Default

Targets

    • Target

      03e81c8df40db6549e905d8832fa1b80.exe

    • Size

      359KB

    • MD5

      03e81c8df40db6549e905d8832fa1b80

    • SHA1

      8653cebf8079fa38d845d12e424bcde4afd625b4

    • SHA256

      d98129981f18ffdf2db5edd0fc09442cc35ac1458971ca0ed14fe58dcd0dd3e0

    • SHA512

      b2999496aa5eb2ca90603a458d96523fc5795365c86e71d5a03cf79b2764ec572d4f1da15207836a78ec0df1b703b0efad46643945ffd5225c607abe5327c9e0

    • Arkei

      Arkei is an infostealer written in C++.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks