General

  • Target

    6aa9785c788205916c58c12be189e23101c3b8137e08a851061968d6e1826b59.exe

  • Size

    175KB

  • Sample

    240725-d23bxsygna

  • MD5

    9e31bf43798ffd4d029c94caff29023e

  • SHA1

    d96e79d2bd84ec6ce72d5195cd7cb55ac5db2e68

  • SHA256

    6aa9785c788205916c58c12be189e23101c3b8137e08a851061968d6e1826b59

  • SHA512

    8ad8bec5075be1e803724d1d962b2f99badb96b94f992c2005c5fb5e389af6378450b624c21c940579140b6b5a34b4587645be7035f031125b3b93252e4d124a

  • SSDEEP

    3072:K/E8k9V0JIYmDdMh1+foxoSaS4eH53U/tV+FNb8EGBGCH:K/E8k9SgD6/Tmb/r+Fp8EG0

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

62.3.12.9/oCWKaZ5eh7.php

Targets

    • Target

      6aa9785c788205916c58c12be189e23101c3b8137e08a851061968d6e1826b59.exe

    • Size

      175KB

    • MD5

      9e31bf43798ffd4d029c94caff29023e

    • SHA1

      d96e79d2bd84ec6ce72d5195cd7cb55ac5db2e68

    • SHA256

      6aa9785c788205916c58c12be189e23101c3b8137e08a851061968d6e1826b59

    • SHA512

      8ad8bec5075be1e803724d1d962b2f99badb96b94f992c2005c5fb5e389af6378450b624c21c940579140b6b5a34b4587645be7035f031125b3b93252e4d124a

    • SSDEEP

      3072:K/E8k9V0JIYmDdMh1+foxoSaS4eH53U/tV+FNb8EGBGCH:K/E8k9SgD6/Tmb/r+Fp8EG0

    • Arkei

      Arkei is an infostealer written in C++.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks