MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0616ca38ef4871e10a43a27a1c8a0277f0dcd92326679d03663cd00da3f1d8b1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 0616ca38ef4871e10a43a27a1c8a0277f0dcd92326679d03663cd00da3f1d8b1
SHA3-384 hash: c66724ef933355e352263815741415271edbde76ea441f128363b85407a4604f212e2c4d01c87423caca832ebd4b3c87
SHA1 hash: f5a04bb95cfe59e17ccde0bed656607a79380a89
MD5 hash: b8f22fbcb1d579d4b03639090559aaa7
humanhash: stream-king-arkansas-romeo
File name:b8f22fbcb1d579d4b03639090559aaa7.exe
Download: download sample
Signature ArkeiStealer
File size:634'880 bytes
First seen:2022-03-23 20:08:03 UTC
Last seen:2022-05-16 08:42:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2ac742258504eaabd5a3bfa9d9f95939 (5 x Stop, 1 x Smoke Loader, 1 x RedLineStealer)
ssdeep 12288:rgHND/aVb0ilrjpk8xoN2/v+wAGfdSisZAKTkh3pT/fabC6s:AiJL1pk8qN2/mUSxkys
Threatray 3'832 similar samples on MalwareBazaar
TLSH T12FD4F110B7A0D035E5BB15F44879D7B9B81E7DA1AB2464CB62D51BEE4639BE0EC3030B
File icon (PE):PE icon
dhash icon b6dacabecee6baa6 (72 x Stop, 68 x RedLineStealer, 55 x Smoke Loader)
Reporter abuse_ch
Tags:ArkeiStealer climatejustice-social exe stereodon-social

Intelligence


File Origin
# of uploads :
3
# of downloads :
195
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Creating a window
Delayed writing of the file
Sending a UDP request
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Launching a process
Stealing user critical data
Launching a tool to kill processes
Forced shutdown of a browser
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CPUID_Instruction
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Chapak
Status:
Malicious
First seen:
2022-03-23 18:59:09 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:770 discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Vidar Stealer
Vidar
Malware Config
C2 Extraction:
https://stereodon.social/@samssal
https://climatejustice.social/@s4m7al
Unpacked files
SH256 hash:
4c532ad823f6d5d35e11b38c347cb4f5960c60908358ca4c65e91ff66bc7a58b
MD5 hash:
4e2c4c05133f17d5f695b353e4cc8f83
SHA1 hash:
dfad351c8a9eeb1ebd4465a57a9ac8f264653742
SH256 hash:
0616ca38ef4871e10a43a27a1c8a0277f0dcd92326679d03663cd00da3f1d8b1
MD5 hash:
b8f22fbcb1d579d4b03639090559aaa7
SHA1 hash:
f5a04bb95cfe59e17ccde0bed656607a79380a89
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 0616ca38ef4871e10a43a27a1c8a0277f0dcd92326679d03663cd00da3f1d8b1

(this sample)

  
Delivery method
Distributed via web download

Comments