MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f3752cdf6653a331205269e6bd6ca4e265247847eed5be677bf758f29235d08. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 0f3752cdf6653a331205269e6bd6ca4e265247847eed5be677bf758f29235d08
SHA3-384 hash: 6f69f3b8c3a0e2f0b3778d4a8716cf9decfbc37bd7fad0263b851009f17ca77a681c7a7b30bbd5d2be9b93d94a6838b7
SHA1 hash: da30b182d738ba13522a47dcacafde6c95fd4c81
MD5 hash: ef35dc59b9fa276abf18124fe027d531
humanhash: eleven-music-network-july
File name:Wed191029a419a6.exe
Download: download sample
Signature ArkeiStealer
File size:622'592 bytes
First seen:2022-07-23 02:33:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f6ee633166e72a1d10f4f54440093ac0 (4 x RaccoonStealer, 2 x FickerStealer, 2 x ArkeiStealer)
ssdeep 12288:a1WQx7flEHm6JvlwfEttnh3XbyQqdPrl2mQmJWW/1duNeduiafb4:H6flGyfEbBLq5h2JkWWddugduiaj4
Threatray 715 similar samples on MalwareBazaar
TLSH T15BD4E030A6A1C034F4B311F885A693BCB93A7A716B7440CF52D66AED4B386E5EC30757
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon ead8a89cc6e68ee0 (43 x RaccoonStealer, 31 x RedLineStealer, 20 x Smoke Loader)
Reporter T9O4TsWMWYLLeXs
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
261
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-08-26 02:25:37 UTC
Tags:
trojan stealer vidar evasion loader opendir rat redline raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Query of malicious DNS domain
Sending a TCP request to an infection source
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw
Score:
84 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-08-25 22:50:43 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:706 stealer
Behaviour
Modifies system certificate store
Suspicious use of WriteProcessMemory
Program crash
Vidar Stealer
Vidar
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
Detections:
win_vidar_auto
SH256 hash:
0f3752cdf6653a331205269e6bd6ca4e265247847eed5be677bf758f29235d08
MD5 hash:
ef35dc59b9fa276abf18124fe027d531
SHA1 hash:
da30b182d738ba13522a47dcacafde6c95fd4c81
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments