MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 03d1832abf518c028cf76057aa8ae09773be84840bff607e0c09da8d0d9f3e41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 1 File information Comments

SHA256 hash: 03d1832abf518c028cf76057aa8ae09773be84840bff607e0c09da8d0d9f3e41
SHA3-384 hash: 4fcaf4169c499dd28a844c7d1540a4a7131c2608be02504cf7096c4c8dcbb3affbc6f53970e159d45ef1ed09c5d0339d
SHA1 hash: 672f9fabe5febcee206b11a3e9f813c2ff338987
MD5 hash: 879bfa00324f6e16b5a74b8982649874
humanhash: bulldog-bulldog-coffee-salami
File name:879BFA00324F6E16B5A74B8982649874.exe
Download: download sample
Signature ArkeiStealer
File size:4'135'175 bytes
First seen:2021-03-22 17:39:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (864 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 98304:UbiXeGFoyye5Mia9Ygjd4phMEzuQw2kvpDtZ:UuvtyaB5Wd4P075X
TLSH 0E163302B6E058B1D0B119721D6C9725257CBD301A24EFBBB3C42A5EDB710D2EB36B67
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
http://juhjuh.com/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://juhjuh.com/ https://threatfox.abuse.ch/ioc/4395/

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
879BFA00324F6E16B5A74B8982649874.exe
Verdict:
Malicious activity
Analysis date:
2021-03-22 17:52:10 UTC
Tags:
evasion rat redline trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Sending a UDP request
Creating a file in the %temp% directory
Creating a file
DNS request
Launching cmd.exe command interpreter
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Sending an HTTP GET request
Creating a process with a hidden window
Connecting to a non-recommended domain
Reading critical registry keys
Deleting a recently created file
Launching a process
Running batch commands
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cyberduck Socelars UACMe
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Drops PE files to the document folder of the user
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Renames NTDLL to bypass HIPS
Sample is not signed and drops a device driver
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Cyberduck
Yara detected Socelars
Yara detected UACMe UAC Bypass tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 373534 Sample: 9MyoOYNXKe.exe Startdate: 23/03/2021 Architecture: WINDOWS Score: 100 139 Antivirus detection for URL or domain 2->139 141 Antivirus detection for dropped file 2->141 143 Multi AV Scanner detection for dropped file 2->143 145 12 other signatures 2->145 10 9MyoOYNXKe.exe 14 2->10         started        process3 file4 81 C:\Users\user\Desktop\pub2.exe, PE32 10->81 dropped 83 C:\Users\user\Desktop\clprosd.exe, PE32 10->83 dropped 85 C:\Users\user\Desktop\aszd.exe, PE32 10->85 dropped 87 6 other files (2 malicious) 10->87 dropped 13 clprosd.exe 6 10->13         started        18 lbpic.exe 10->18         started        20 pub2.exe 1 10->20         started        22 6 other processes 10->22 process5 dnsIp6 121 103.155.92.70 TWIDC-AS-APTWIDCLimitedHK unknown 13->121 123 185.195.27.245 SUPERSERVERSDATACENTERRU Russian Federation 13->123 129 8 other IPs or domains 13->129 89 C:\Users\user\Documents\vRWVcNF1sQMT.exe, PE32 13->89 dropped 91 C:\Users\user\Documents\ok1UPap4AaAD.exe, PE32 13->91 dropped 93 C:\Users\user\Documents\OJuylC0Xn3qT.exe, PE32 13->93 dropped 159 Drops PE files to the document folder of the user 13->159 161 Writes to foreign memory regions 13->161 163 Allocates memory in foreign processes 13->163 165 Injects a PE file into a foreign processes 13->165 24 OJuylC0Xn3qT.exe 13->24         started        28 RegAsm.exe 13->28         started        31 RegAsm.exe 13->31         started        41 9 other processes 13->41 95 C:\Users\user\AppData\Local\...\lbpic.tmp, PE32 18->95 dropped 33 lbpic.tmp 18->33         started        97 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 20->97 dropped 167 Detected unpacking (changes PE section rights) 20->167 169 Renames NTDLL to bypass HIPS 20->169 171 Maps a DLL or memory area into another process 20->171 173 2 other signatures 20->173 125 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 22->125 127 208.95.112.1 TUT-ASUS United States 22->127 131 6 other IPs or domains 22->131 99 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 22->99 dropped 101 C:\Users\user\AppData\...\multitimer.exe, PE32 22->101 dropped 103 C:\ProgramData\6256934.68, PE32 22->103 dropped 105 5 other malicious files 22->105 dropped 35 cmd.exe 22->35         started        37 WerFault.exe 22->37         started        39 jfiag3g_gg.exe 22->39         started        file7 signatures8 process9 dnsIp10 65 C:\Users\user\AppData\...\fO7I2diCR.sys, PE32+ 24->65 dropped 147 Detected unpacking (creates a PE file in dynamic memory) 24->147 149 Sample is not signed and drops a device driver 24->149 151 Tries to detect virtualization through RDTSC time measurements 24->151 115 157.240.9.35 FACEBOOKUS United States 28->115 67 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 28->67 dropped 43 jfiag3g_gg.exe 28->43         started        117 52.95.169.52 AMAZON-02US United States 33->117 69 C:\Users\user\AppData\Local\...\Ka123l.exe, PE32 33->69 dropped 71 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 33->71 dropped 73 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 33->73 dropped 75 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 33->75 dropped 46 Ka123l.exe 33->46         started        77 C:\Users\user\AppData\Local\Temp\doru4r.exe, PE32 35->77 dropped 50 doru4r.exe 35->50         started        52 conhost.exe 35->52         started        54 taskkill.exe 35->54         started        119 104.42.151.234 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 37->119 file11 signatures12 process13 dnsIp14 153 Tries to harvest and steal browser information (history, passwords, etc) 43->153 133 93.184.221.240 EDGECASTUS European Union 46->133 135 52.95.170.64 AMAZON-02US United States 46->135 137 2 other IPs or domains 46->137 107 C:\Users\user\AppData\...\Dibipivumy.exe, PE32 46->107 dropped 109 C:\Users\user\AppData\...\Rupishiwebi.exe, PE32 46->109 dropped 111 C:\Program Files\windows nt\...\prolab.exe, PE32 46->111 dropped 113 4 other malicious files 46->113 dropped 155 Antivirus detection for dropped file 46->155 157 Machine Learning detection for dropped file 46->157 56 cmd.exe 50->56         started        59 cmd.exe 50->59         started        file15 signatures16 process17 file18 79 C:\Users\user\AppData\Local\Temp\UJwVWKp.OA, MS-DOS 56->79 dropped 61 conhost.exe 56->61         started        63 conhost.exe 59->63         started        process19
Threat name:
Win32.Infostealer.Passteal
Status:
Malicious
First seen:
2021-03-16 18:44:15 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:icedid family:metasploit family:raccoon family:redline family:smokeloader family:vidar botnet:2ce901d964b370c5ccda7e4d68354ba040db8218 backdoor banker dropper evasion infostealer loader persistence spyware stealer themida trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtCreateThreadExHideFromDebugger
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
themida
Executes dropped EXE
UPX packed file
VMProtect packed file
IcedID First Stage Loader
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Glupteba
Glupteba Payload
IcedID, BokBot
MetaSploit
Raccoon
RedLine
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://funzel.info/upload/
http://doeros.xyz/upload/
http://vromus.com/upload/
http://hqans.com/upload/
http://vxeudy.com/upload/
http://poderoa.com/upload/
http://nezzzo.com/upload/
http://xsss99.icu/upload/
http://bingooodsg.icu/upload/
http://junntd.xyz/upload/
http://ginessa11.xyz/upload/
http://overplayninsx.xyz/upload/
http://bananinze.com/upload/
http://daunimlas.com/upload/
fsikiolker.uno
Unpacked files
SH256 hash:
20406cc32287a18677e550472bdb026216424fcada29862e8245e546878ade2b
MD5 hash:
3414272a19b5ed4c4e1155bba568e47b
SHA1 hash:
ffaf03efcb7e7d7bfd33291a7cc04c07e1c798fb
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
8d3a67a08a02f34224b8ca9e2a7cd73c2985f8e34e8af712920e69a1782e3b88
MD5 hash:
7c605eab4a34bd4e81ec2842a289c969
SHA1 hash:
ecc6783fbb0b398a65ba15dbd2158c584c97562d
SH256 hash:
3cf974f8670dec9dc0ac216fed04bd827ff7b88a5fca72ec9e39924b5c21021f
MD5 hash:
076b253b5e6496be5eb77f8f78448b85
SHA1 hash:
3df6735cd1da68b551ba1f3da36e8956d16ac5e9
SH256 hash:
9bd63566e930a5fcfb238423a1eeb3e99366b75eea21b235e420d8f6b3b1d8c3
MD5 hash:
62cae09174b8bb0590646c40d023c19b
SHA1 hash:
29bc52c441c88d3f2fcf42ab69074c850650bc34
SH256 hash:
8323874b273cc0bcb70582d22c7f024766492576180eec2d78e2ef49e51f9873
MD5 hash:
ecac61400f2e518f9ea0ec16593c7a78
SHA1 hash:
931cd90f36438ef204997ec1665ff81c35612940
SH256 hash:
6525d30654a1a8255ac9a366035d841b991648e442f3a802f919726d604e9ce4
MD5 hash:
799f15cb784fe1bd6922939d46426c20
SHA1 hash:
43cc59cf651dca1208271ab740a7820054df8ba0
SH256 hash:
13e3814f8c88b0864b4be410d7b85bedceda1d32ae30acad913c14f14243f844
MD5 hash:
727706d0daaee6ec778cbaffbd87faf5
SHA1 hash:
0e9e5d684a4d0cb9d8cba7485efcad054807172a
SH256 hash:
cfdb0a1a4583d7baf22de50c1a486fff8e2218180ed0111e3e3107d411b70e0b
MD5 hash:
1a13688482bbb4c57e2b9ecbd649b424
SHA1 hash:
5d6079492b1b4b89740c9abac7bef811b5e8924d
SH256 hash:
f1b22c4c6f4e37386f68b1cc86a0d7feed362eb7407630fcacd7ff037ce5be41
MD5 hash:
dcaa9e7f17c8d9c2398c16682e2fbb32
SHA1 hash:
ebe34316bcf9a1a6581d362b6e43176b9fe64e38
SH256 hash:
d27f2258b1242da1c58e4ee612b86f5a200b817c0d31828dff2adf81dd986ab6
MD5 hash:
6cd24b9be55643a970ad9d32f6049d5b
SHA1 hash:
43707f1fcb0605812173ba2426317c85d95af455
Detections:
win_socelars_auto
SH256 hash:
ea22aa8d8c8820797eb7429dfecfb0b82251901540a62c9cdb4fcfb7fea7d495
MD5 hash:
ae37ad3fceea887897b974d2952d45e5
SHA1 hash:
3ed68af70414419bd9478621c096ff600a999094
SH256 hash:
ead57ceb287a0c685ccd1673b5ba2a236d53a0ea2511d9b429351b206cbdcc13
MD5 hash:
3ed67beacd071b7721f8b7f87d43ee3a
SHA1 hash:
7786af0c0edcd35f0cc8eeb46e76d8206b344580
SH256 hash:
03d1832abf518c028cf76057aa8ae09773be84840bff607e0c09da8d0d9f3e41
MD5 hash:
879bfa00324f6e16b5a74b8982649874
SHA1 hash:
672f9fabe5febcee206b11a3e9f813c2ff338987
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_smokeloader_a2
Author:pnx

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments