Analysis
-
max time kernel
75s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 16:05
Static task
static1
Behavioral task
behavioral1
Sample
7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625.exe
Resource
win7-20230621-en
windows7-x64
2 signatures
150 seconds
General
-
Target
7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625.exe
-
Size
229KB
-
MD5
2e89a7aae558e9be86042e2bd7e65803
-
SHA1
64e85269651f0a475d0a94eb98cd3adbf3061e10
-
SHA256
7022a16d455a3ad78d0bbeeb2793cb35e48822c3a0a8d9eaa326ffc91dd9e625
-
SHA512
333d17a364c4e3b226de86dfb3cc2b74684c4a37a30d3e690ca69c4be2119f4f4184ea59c7557cfccf4ce78f8c3bc67f0a4360fd465cd8bb44808ab4ccb07f1b
-
SSDEEP
3072:iq0Je2P1VU4W3gwbBPWq3rZP55Zu3DtYyprz8gJy436s+OssN+uQSYftoyQ4tpvG:iq0rnURb0K742Ajx3qSYe94tpvURSYOc
Malware Config
Extracted
Family
arkei
Botnet
Default
C2
sughicent.com/blaka.php
Signatures
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2112-134-0x0000000000400000-0x000000000043C000-memory.dmp family_arkei behavioral2/memory/2112-135-0x0000000000400000-0x000000000043C000-memory.dmp family_arkei