General

  • Target

    7E0879F28322430C582D4E54EC0D91FB19E0471B43CD460D30307FA6ACF0A385.exe

  • Size

    281KB

  • Sample

    240724-t9y78szapa

  • MD5

    a131f7c0c6109b3d701767b24a1ec9b8

  • SHA1

    2d42e6211039255898af5606ce8f7c60b31782de

  • SHA256

    c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21

  • SHA512

    a7724856692645bf37c3504771895cda1d75e9d09a9b15d923e0bd5aa323c9949ff5fe790724eb89b4cdeb3631688b5d07edb2d2bdbb2ef6462ac72cebd001fd

  • SSDEEP

    6144:8oTJaMlWeC/iKbHiiq1YmNin91Izx2KQcVWMo4:8uzlWeC/iKbfeSnox7

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

coin-file-file-19.com/tratata.php

Targets

    • Target

      7E0879F28322430C582D4E54EC0D91FB19E0471B43CD460D30307FA6ACF0A385.exe

    • Size

      281KB

    • MD5

      a131f7c0c6109b3d701767b24a1ec9b8

    • SHA1

      2d42e6211039255898af5606ce8f7c60b31782de

    • SHA256

      c634d3b81cf3991d24b037fdb80bacfb576216c3768149432b3e799583ef7b21

    • SHA512

      a7724856692645bf37c3504771895cda1d75e9d09a9b15d923e0bd5aa323c9949ff5fe790724eb89b4cdeb3631688b5d07edb2d2bdbb2ef6462ac72cebd001fd

    • SSDEEP

      6144:8oTJaMlWeC/iKbHiiq1YmNin91Izx2KQcVWMo4:8uzlWeC/iKbfeSnox7

    • Arkei

      Arkei is an infostealer written in C++.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks