MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 08f265523a5b4db4009f35c57c6f71dca1d0f6a8d00880d1853879158e98d5f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments 1

SHA256 hash: 08f265523a5b4db4009f35c57c6f71dca1d0f6a8d00880d1853879158e98d5f0
SHA3-384 hash: d19a261734432d89e1890f36e20d5bdcf466cd39d6b5dcaaf541fc71fb192b336cbb1c4acadb832c686d389e92d2f5c2
SHA1 hash: f94ec84e94f2db1467acd0c09af3e6d218182f64
MD5 hash: 6d982fa4f9b078255c1167e9889cea9b
humanhash: golf-speaker-oranges-twelve
File name:bot.exe
Download: download sample
Signature ArkeiStealer
File size:667'648 bytes
First seen:2021-05-07 04:42:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 34a67fe119290f5d8e9e21661874bcdd (1 x ArkeiStealer, 1 x RaccoonStealer)
ssdeep 12288:5fW+j769p9hcwG6A5HdEPpRxjVIYGYp0ZOI5vOj4WZDac/WZL8X:VXaJA5KPpRxjVI/YKEOu4wGc6L8X
Threatray 250 similar samples on MalwareBazaar
TLSH 0FE4E130E6A0C031E9B701F849BA837CE52CFE605B2451EB52D51BFA5634BF96D3129B
Reporter starsSk87264403
Tags:ArkeiStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
104
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a UDP request
Sending a custom TCP request
Creating a file
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-05-01 13:29:07 UTC
AV detection:
37 of 47 (78.72%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies system certificate store
Unpacked files
SH256 hash:
363b4956f72928aa09e7ecd601aaaf1cde5af343a96a56016d3cfb3ee4004a99
MD5 hash:
9a68f3fde74e9510d2c3d71eb06969f9
SHA1 hash:
f84bcca796272a1155f024a0d8ea48bdb0c36fbd
Detections:
win_vidar_auto
SH256 hash:
08f265523a5b4db4009f35c57c6f71dca1d0f6a8d00880d1853879158e98d5f0
MD5 hash:
6d982fa4f9b078255c1167e9889cea9b
SHA1 hash:
f94ec84e94f2db1467acd0c09af3e6d218182f64
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 08f265523a5b4db4009f35c57c6f71dca1d0f6a8d00880d1853879158e98d5f0

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-07 05:22:41 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [C0003.002] Communication Micro-objective::Connect Pipe::Interprocess Communication
1) [C0003.001] Communication Micro-objective::Create Pipe::Interprocess Communication
2) [C0003.003] Communication Micro-objective::Read Pipe::Interprocess Communication
3) [C0003.004] Communication Micro-objective::Write Pipe::Interprocess Communication
4) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
5) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
6) [C0047] File System Micro-objective::Delete File
7) [C0049] File System Micro-objective::Get File Attributes
8) [C0051] File System Micro-objective::Read File
9) [C0052] File System Micro-objective::Writes File
10) [C0007] Memory Micro-objective::Allocate Memory
11) [C0033] Operating System Micro-objective::Console
12) [C0034.001] Operating System Micro-objective::Set Variable::Environment Variable
13) [C0040] Process Micro-objective::Allocate Thread Local Storage
14) [C0043] Process Micro-objective::Check Mutex
15) [C0042] Process Micro-objective::Create Mutex
16) [C0041] Process Micro-objective::Set Thread Local Storage Value
17) [C0018] Process Micro-objective::Terminate Process