MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1294c153ac518fdee0006ea0c421731420fffc205331d85dcd2c027ca933b906. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 1294c153ac518fdee0006ea0c421731420fffc205331d85dcd2c027ca933b906
SHA3-384 hash: 6e9938500adefa326290183193912e0ef8e6e21d5dd182bc65acf69a0828013ae942990d3d26f06995d39eea56d4aebb
SHA1 hash: 711b0cf4f3785135b14cb84e800a2606e880925a
MD5 hash: a86d59e07623a81522f40644a1c5bbe1
humanhash: red-paris-two-robert
File name:a86d59e07623a81522f40644a1c5bbe1.exe
Download: download sample
Signature ArkeiStealer
File size:4'211'956 bytes
First seen:2021-07-16 02:10:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xMXxj+HYnb8BZ1jNsYdGCGkpZz0RElOo9GCvLUBsKUOxS:xMXxj+HYQBZ1jWCGvkXz8kOivLUCKdU
Threatray 167 similar samples on MalwareBazaar
TLSH T1121633E172E2C0B7DBAD05BAD2C4BFF254FAC78D173049D37321E6185E39855C22A869
Reporter abuse_ch
Tags:ArkeiStealer exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
86.106.181.209:58703

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
86.106.181.209:58703 https://threatfox.abuse.ch/ioc/160592/

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://procrackerz.org/latest-photoshop-cc-2021-crack-full/
Verdict:
Malicious activity
Analysis date:
2021-06-29 23:28:35 UTC
Tags:
trojan evasion rat redline stealer vidar phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer Cookie Stealer RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Backstage Stealer
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 449691 Sample: aNqEZVlL9Y.exe Startdate: 16/07/2021 Architecture: WINDOWS Score: 100 183 Found malware configuration 2->183 185 Antivirus detection for URL or domain 2->185 187 Multi AV Scanner detection for submitted file 2->187 189 11 other signatures 2->189 11 aNqEZVlL9Y.exe 16 2->11         started        14 haleng.exe 2->14         started        17 WinHoster.exe 2->17         started        process3 dnsIp4 129 C:\Users\user\AppData\...\setup_install.exe, PE32 11->129 dropped 131 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 11->131 dropped 133 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 11->133 dropped 137 9 other files (none is malicious) 11->137 dropped 19 setup_install.exe 1 11->19         started        167 157.240.196.35 FACEBOOKUS United States 14->167 135 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 14->135 dropped 23 jfiag3g_gg.exe 14->23         started        file5 process6 dnsIp7 153 104.21.12.59 CLOUDFLARENETUS United States 19->153 155 127.0.0.1 unknown unknown 19->155 197 Detected unpacking (changes PE section rights) 19->197 25 cmd.exe 1 19->25         started        27 cmd.exe 1 19->27         started        29 cmd.exe 1 19->29         started        31 6 other processes 19->31 signatures8 process9 process10 33 arnatic_6.exe 4 49 25->33         started        38 arnatic_3.exe 5 27->38         started        40 arnatic_5.exe 15 8 29->40         started        42 arnatic_7.exe 31->42         started        44 arnatic_8.exe 31->44         started        46 arnatic_4.exe 1 1 31->46         started        dnsIp11 139 136.144.41.133 WORLDSTREAMNL Netherlands 33->139 141 136.144.41.201 WORLDSTREAMNL Netherlands 33->141 149 9 other IPs or domains 33->149 89 C:\Users\...\uhx8E1qF1wHGKJ7QGRlvg5nr.exe, PE32 33->89 dropped 91 C:\Users\...\uXUenUUsc69NQI6Bc5rDT26R.exe, PE32 33->91 dropped 93 C:\Users\...\u3KPZnJyscHzZziCqhS5S6kM.exe, PE32 33->93 dropped 101 27 other files (16 malicious) 33->101 dropped 191 Drops PE files to the document folder of the user 33->191 193 Disable Windows Defender real time protection (registry) 33->193 143 192.168.2.1 unknown unknown 38->143 95 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 38->95 dropped 48 rundll32.exe 38->48         started        145 172.67.201.250 CLOUDFLARENETUS United States 40->145 97 C:\Users\user\AppData\Roaming\6262179.exe, PE32 40->97 dropped 99 C:\Users\user\AppData\Roaming\4108538.exe, PE32 40->99 dropped 103 2 other files (none is malicious) 40->103 dropped 51 6262179.exe 40->51         started        53 1934671.exe 40->53         started        57 4108538.exe 40->57         started        59 1603535.exe 40->59         started        195 Injects a PE file into a foreign processes 42->195 63 3 other processes 42->63 105 3 other files (none is malicious) 44->105 dropped 61 jhuuee.exe 44->61         started        65 2 other processes 44->65 147 208.95.112.1 TUT-ASUS United States 46->147 151 4 other IPs or domains 46->151 67 5 other processes 46->67 file12 signatures13 process14 dnsIp15 169 Writes to foreign memory regions 48->169 171 Allocates memory in foreign processes 48->171 173 Creates a thread in another existing process (thread injection) 48->173 69 svchost.exe 48->69 injected 72 svchost.exe 48->72 injected 74 svchost.exe 48->74 injected 175 Query firmware table information (likely to detect VMs) 51->175 177 Tries to detect sandboxes and other dynamic analysis tools (window names) 51->177 179 Hides threads from debuggers 51->179 181 Tries to detect sandboxes / dynamic malware analysis system (registry check) 51->181 163 104.21.19.209 CLOUDFLARENETUS United States 53->163 111 C:\ProgramData\78\vcruntime140.dll, PE32 53->111 dropped 113 C:\ProgramData\78\sqlite3.dll, PE32 53->113 dropped 115 C:\ProgramData\78\softokn3.dll, PE32 53->115 dropped 125 4 other files (none is malicious) 53->125 dropped 165 104.21.87.184 CLOUDFLARENETUS United States 57->165 117 C:\ProgramData\76\vcruntime140.dll, PE32 57->117 dropped 119 C:\ProgramData\76\sqlite3.dll, PE32 57->119 dropped 127 5 other files (none is malicious) 57->127 dropped 121 C:\Users\user\AppData\...\WinHoster.exe, PE32 59->121 dropped 76 WinHoster.exe 59->76         started        123 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 61->123 dropped 78 jfiag3g_gg.exe 61->78         started        80 jfiag3g_gg.exe 61->80         started        82 conhost.exe 65->82         started        file16 signatures17 process18 signatures19 199 Sets debug register (to hijack the execution of another thread) 69->199 201 Modifies the context of a thread in another process (thread injection) 69->201 84 svchost.exe 69->84         started        process20 dnsIp21 157 172.67.200.215 CLOUDFLARENETUS United States 84->157 159 172.67.215.92 CLOUDFLARENETUS United States 84->159 161 198.13.62.186 AS-CHOOPAUS United States 84->161 107 C:\Users\user\AppData\...\Login Data.tmp, SQLite 84->107 dropped 109 C:\Users\user\AppData\Local\...\Cookies.tmp, SQLite 84->109 dropped 203 Query firmware table information (likely to detect VMs) 84->203 205 Tries to harvest and steal browser information (history, passwords, etc) 84->205 file22 signatures23
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-06-30 09:14:07 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar botnet:865 botnet:903 botnet:domani aspackv2 discovery evasion infostealer persistence spyware stealer themida trojan upx
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
varinnitof.xyz:80
https://sslamlssa1.tumblr.com/
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
ff92a6e4b786bad248b1594085510d19f292993801eb8c55408f94f92a2e84b4
MD5 hash:
7c88a8ff483f0b84a97daa4820efeea7
SHA1 hash:
93ec01a144b56d4a3e136adedeb18de06490339d
SH256 hash:
10a122bd647c88aa23f96687e26b251862e83be9dbb89532f4a578689547972d
MD5 hash:
89c739ae3bbee8c40a52090ad0641d31
SHA1 hash:
d0f7dc9a0a3e52af0f9f9736f26e401636c420a1
SH256 hash:
af17f05e2a0e5a774d5b4e9740c25098a147fed0d07b06805ba4fe56f40db9c0
MD5 hash:
81ec507cf735cd0776e879af6dba0f45
SHA1 hash:
6ddaed9a1812ceef3e8810397500b1b54d18e6b7
SH256 hash:
06678b907d4d27ed0c8bc29624aa23eb3835e147a3b9d624c462957ae0b0c62b
MD5 hash:
9e30712087978f3c1eeb38b32db43842
SHA1 hash:
07741e7867f98107bc6d6bf39325218bc4426b8e
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
a44d8aa57db199503ee029bf73e922daabf707598b6d5cac1805d47bd956ad86
MD5 hash:
f421a51b26c06de59948172ccfd1a2d6
SHA1 hash:
a851cb33400ae722ed6e942ae31c1554e1e297ff
SH256 hash:
d5e7a987dd3a93c9c435097fc95d76c07aadd16e08158fe9d42389c0793f2f7f
MD5 hash:
112f83f9d855241e275101bdfd4a7097
SHA1 hash:
7608f6721aeb2ec2a7deaefc66a7f1117fdd4a36
SH256 hash:
f4031df5e0df4785513fd9fc9843e0aba4623e61b58cd163354ea64f9133b388
MD5 hash:
bdd81266d64b5a226dd38e4decd8cc2c
SHA1 hash:
2395557e0d8fd9bcfe823391a9a7cfe78ee0551a
SH256 hash:
b77b321da6161979afb720f418ee38993d1d936a3785e170434f8077114e2670
MD5 hash:
dca652c0ff1d9d994b7ad6c1d0ff94ba
SHA1 hash:
95fe61ad947caf528a1e2dbf0889d864e0ac124d
SH256 hash:
1294c153ac518fdee0006ea0c421731420fffc205331d85dcd2c027ca933b906
MD5 hash:
a86d59e07623a81522f40644a1c5bbe1
SHA1 hash:
711b0cf4f3785135b14cb84e800a2606e880925a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments