General
-
Target
Microsoft.ApplicationInsights.PersistenceChannel.dll
-
Size
458KB
-
Sample
210913-q3jx7aghbk
-
MD5
14e351015c5d632f888dbcac03871fae
-
SHA1
b5471c5eea356ce87ac5c2df8bbd9bc72cf84da9
-
SHA256
977a8d56d7bbc22e780e85bea06fa4be13c8f9be01515665863cb431fb2e8daa
-
SHA512
f7ac50b3cc68404ddc14579c9e12239a292afc4e034232274f8987579fbf3ea59a64403e122b946cceec9a383633cb3b7f3eedade819125a017de7c6a48a8947
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft.ApplicationInsights.PersistenceChannel.dll.exe
Resource
win7v20210408
Malware Config
Targets
-
-
Target
Microsoft.ApplicationInsights.PersistenceChannel.dll
-
Size
458KB
-
MD5
14e351015c5d632f888dbcac03871fae
-
SHA1
b5471c5eea356ce87ac5c2df8bbd9bc72cf84da9
-
SHA256
977a8d56d7bbc22e780e85bea06fa4be13c8f9be01515665863cb431fb2e8daa
-
SHA512
f7ac50b3cc68404ddc14579c9e12239a292afc4e034232274f8987579fbf3ea59a64403e122b946cceec9a383633cb3b7f3eedade819125a017de7c6a48a8947
-
Arkei Stealer Payload
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-