Overview
overview
10Static
static
10Akebi/Akebi.exe
windows10-2004-x64
10Akebi/cef.js
windows10-2004-x64
1Akebi/cef_...ent.js
windows10-2004-x64
1Akebi/cef_...ent.js
windows10-2004-x64
1Akebi/cef_...ons.js
windows10-2004-x64
1Akebi/chrome_elf.dll
windows10-2004-x64
3Akebi/chromelf.dll
windows10-2004-x64
3Akebi/d3dc...47.dll
windows10-2004-x64
3Akebi/d3dsystem.dll
windows10-2004-x64
3Akebi/devt...ces.js
windows10-2004-x64
1Akebi/dll/...lf.dll
windows10-2004-x64
3Akebi/dll/...em.dll
windows10-2004-x64
3Akebi/dll/...v2.dll
windows10-2004-x64
3Akebi/dll/libeab.dll
windows10-2004-x64
1Akebi/dll/lindel.dll
windows10-2004-x64
3Akebi/ffmpeg.dll
windows10-2004-x64
1Akebi/libEGL.dll
windows10-2004-x64
1Akebi/libGLEOSv2.dll
windows10-2004-x64
3Akebi/libGLESv2.dll
windows10-2004-x64
3Akebi/libcef.dll
windows10-2004-x64
1Akebi/libeab.dll
windows10-2004-x64
1Akebi/lindel.dll
windows10-2004-x64
1Akebi/natives_blob.js
windows10-2004-x64
1Akebi/vgrl.dll
windows10-2004-x64
1Akebi/vivoxsdk.dll
windows10-2004-x64
1Analysis
-
max time kernel
56s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2024 09:00
Behavioral task
behavioral1
Sample
Akebi/Akebi.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
Akebi/cef.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Akebi/cef_100_percent.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Akebi/cef_200_percent.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Akebi/cef_extensions.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
Akebi/chrome_elf.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Akebi/chromelf.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
Akebi/d3dcompiler_47.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
Akebi/d3dsystem.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
Akebi/devtools_resources.js
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Akebi/dll/chromelf.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral12
Sample
Akebi/dll/d3dsystem.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Akebi/dll/libGLEOSv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
Akebi/dll/libeab.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Akebi/dll/lindel.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Akebi/ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Akebi/libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
Akebi/libGLEOSv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Akebi/libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
Akebi/libcef.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
Akebi/libeab.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
Akebi/lindel.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
Akebi/natives_blob.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
Akebi/vgrl.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Akebi/vivoxsdk.dll
Resource
win10v2004-20231215-en
General
-
Target
Akebi/Akebi.exe
-
Size
274KB
-
MD5
6c10aa7f40c68f01050d041ab9c16417
-
SHA1
8b447164852a63f79e276396649f98dfb955e053
-
SHA256
db5cda1822fc9fa50bc6719d835d61692d936b674da3d840ba61ad1b11c616eb
-
SHA512
9636f49c03203faf53e48945efb3e182ddbcbd143822f7c706d11164d2a1a7e86caa72d3eabf307616011b79fb00b35a894dc6055a2d1cfa9966183e96a12a31
-
SSDEEP
6144:Bf+BLtABPDMZZzIlzcwKUfmBnxafTy8lI1D0zOy:uZOnKUfmBXx1DNy
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1205378577210548224/LNcoZrLKPyHLEN4pcKhtXlPWyk5g8jRNtbvhK_L1UGxjObYKgJwFG53LqgVJZWP5xjst
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 freegeoip.app 24 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Akebi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Akebi.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 676 Akebi.exe 676 Akebi.exe 676 Akebi.exe 676 Akebi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 676 Akebi.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD519aed0132fce75f93f4de3a50775f30a
SHA193e04ec9c19abc64ad6fea3eb658bc0584c0dc7f
SHA2562579c985b5539f9a52d0af78e104f79a994d4382cd0cea6ff94cb44e3f4d1aa2
SHA512fc7a8e04f2cc267abb1febad34f2e3d9f3b106c49834c87e138a01639162b3bddf50d628f31e13a07c073731f88e20cc99a3bf8d64758fc7e1e83c0a8f996750