MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 18e1de18c5e3e78a5749c174fb6b8999f930a818e40bb4c3ffd7800d635d23a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 14


Intelligence 14 IOCs 3 YARA File information Comments

SHA256 hash: 18e1de18c5e3e78a5749c174fb6b8999f930a818e40bb4c3ffd7800d635d23a9
SHA3-384 hash: f494a410ed44315b9e856d04f750d78201fd80b7f2c3bd73485cbb4038a80a0a23fe4f336f37fc48eb03bb06ef3cf10d
SHA1 hash: deb0195486a73676ae740c0c3b98cf00dc41a6d5
MD5 hash: 82e25bfeff307afea4b8e46ade8cd8fb
humanhash: lactose-comet-triple-bakerloo
File name:82e25bfeff307afea4b8e46ade8cd8fb.exe
Download: download sample
Signature ArkeiStealer
File size:2'700'895 bytes
First seen:2022-08-23 15:55:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 49152:pAI+nNpJc7YrEa2u2h9swu+AU3Z9CcVL2wD+aRpXPaAt1DD4U3:pAI+Zc8rHJ2jHxZYOTDrRxaAt1DEo
TLSH T13BC53339F182817EC4121D754417C6F2763DF90C0FBE24DABACE1E55482728A3FA56AE
TrID 86.6% (.EXE) Win32 Executable Borland Delphi 7 (664796/42/58)
5.6% (.EXE) InstallShield setup (43053/19/16)
1.8% (.EXE) Win32 Executable Delphi generic (14182/79/4)
1.7% (.SCR) Windows screen saver (13101/52/3)
1.3% (.EXE) DOS Borland compiled Executable (generic) (10000/1/2)
File icon (PE):PE icon
dhash icon b298acbab2ca7a72 (2'327 x GCleaner, 1'631 x Socks5Systemz, 67 x RedLineStealer)
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
http://88.198.122.116/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://88.198.122.116/ https://threatfox.abuse.ch/ioc/844802/
http://88.119.169.27/ https://threatfox.abuse.ch/ioc/844803/
http://77.91.103.222/ https://threatfox.abuse.ch/ioc/844918/

Intelligence


File Origin
# of uploads :
1
# of downloads :
356
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
82e25bfeff307afea4b8e46ade8cd8fb.exe
Verdict:
No threats detected
Analysis date:
2022-08-23 15:56:54 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a file in the Program Files subdirectories
Modifying a system file
Launching a process
Creating a process with a hidden window
Creating a process from a recently created file
Searching for the browser window
Searching for the window
DNS request
Sending a custom TCP request
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Creating a file
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Unauthorized injection to a recently created process
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
75%
Tags:
fingerprint greyware overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
AsyncRAT, CryptOne, Raccoon Stealer v2,
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected AsyncRAT
Yara detected CryptOne packer
Yara detected Generic Downloader
Yara detected MSILDownloaderGeneric
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 688969 Sample: xZ4q0nNSPX.exe Startdate: 23/08/2022 Architecture: WINDOWS Score: 100 76 iplogger.org 2->76 78 dns.google 2->78 80 2 other IPs or domains 2->80 112 Malicious sample detected (through community Yara rule) 2->112 114 Antivirus detection for URL or domain 2->114 116 Antivirus detection for dropped file 2->116 118 18 other signatures 2->118 10 xZ4q0nNSPX.exe 16 28 2->10         started        13 rundll32.exe 2->13         started        signatures3 process4 file5 68 C:\Program Files (x86)\...\safert44.exe, PE32 10->68 dropped 70 C:\Program Files (x86)\Company\...\real.exe, PE32 10->70 dropped 72 C:\Program Files (x86)\...\ordo_sec666.exe, PE32 10->72 dropped 74 7 other malicious files 10->74 dropped 15 EU1.exe 10->15         started        19 F0geI.exe 25 10->19         started        22 real.exe 10->22         started        24 15 other processes 10->24 process6 dnsIp7 92 62.204.41.126, 49914, 80 TNNET-ASTNNetOyMainnetworkFI United Kingdom 15->92 106 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->106 108 Tries to harvest and steal browser information (history, passwords, etc) 15->108 110 Tries to steal Crypto Currency Wallets 15->110 26 cmd.exe 15->26         started        94 45.95.11.158, 49765, 80 ULTRA-PACKETUS Italy 19->94 56 C:\Users\user\AppData\...\vcruntime140.dll, PE32 19->56 dropped 58 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 19->58 dropped 60 C:\Users\user\AppData\LocalLow\softokn3.dll, PE32 19->60 dropped 66 4 other files (none is malicious) 19->66 dropped 96 t.me 149.154.167.99, 443, 49794 TELEGRAMRU United Kingdom 22->96 98 77.91.103.222, 49801, 80 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 22->98 28 cmd.exe 22->28         started        100 103.89.90.61, 34589, 49897 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 24->100 102 195.54.170.157, 16525, 49948 VALICOM-ASPT unknown 24->102 104 5 other IPs or domains 24->104 62 C:\Users\user\AppData\Local\...\SETUP_~1.EXE, PE32 24->62 dropped 64 C:\Users\user\TypeRes\DllResource.exe, PE32 24->64 dropped 30 SETUP_~1.EXE 24->30         started        34 chrome.exe 24->34         started        36 chrome.exe 16 24->36         started        38 11 other processes 24->38 file8 signatures9 process10 dnsIp11 40 conhost.exe 26->40         started        42 taskkill.exe 26->42         started        44 timeout.exe 26->44         started        46 conhost.exe 28->46         started        48 taskkill.exe 28->48         started        50 timeout.exe 28->50         started        82 cdn.discordapp.com 162.159.129.233, 443, 49883 CLOUDFLARENETUS United States 30->82 84 cutt.ly 172.67.8.238, 443, 49877 CLOUDFLARENETUS United States 30->84 120 Encrypted powershell cmdline option found 30->120 52 powershell.exe 30->52         started        86 iplogger.org 148.251.234.83, 443, 49729, 49738 HETZNER-ASDE Germany 36->86 88 142.250.180.138, 443, 49884 GOOGLEUS United States 36->88 90 7 other IPs or domains 36->90 signatures12 process13 process14 54 conhost.exe 52->54         started       
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-08-23 15:56:12 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:dcrat family:redline botnet:5 botnet:5076357887 botnet:nam3 discovery infostealer persistence rat spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Creates a large amount of network flows
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine payload
DcRat
Malware Config
C2 Extraction:
103.89.90.61:34589
176.113.115.146:9582
195.54.170.157:16525
Unpacked files
SH256 hash:
68f65bee7d04525d1419141a0220a32523618f63e9b7d4ace2b77b51ea39bca7
MD5 hash:
b25d72b52b8a3bbbabadfb32d5966783
SHA1 hash:
45d5d4eaa13276273d4be9083061e731cd19d405
Detections:
win_recordbreaker_auto
SH256 hash:
96fe541e9787cd2b4bd0671fb414e9a3b06e718a1542332a9929d75649c8d5e1
MD5 hash:
d0313341a43990fcf7ce8266e21a727a
SHA1 hash:
dcc90e97a8a4b8e2c7052b93a75ff2d66e4f4e24
Detections:
win_vidar_auto
SH256 hash:
18e1de18c5e3e78a5749c174fb6b8999f930a818e40bb4c3ffd7800d635d23a9
MD5 hash:
82e25bfeff307afea4b8e46ade8cd8fb
SHA1 hash:
deb0195486a73676ae740c0c3b98cf00dc41a6d5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 18e1de18c5e3e78a5749c174fb6b8999f930a818e40bb4c3ffd7800d635d23a9

(this sample)

  
Delivery method
Distributed via web download

Comments