MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 190f4fb1b115015c5953c32d83b90e4574b371611ca78f6d37f6c0839b7be9b5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 8 File information Comments

SHA256 hash: 190f4fb1b115015c5953c32d83b90e4574b371611ca78f6d37f6c0839b7be9b5
SHA3-384 hash: 1bcf6d96114d26804d3422901a0a44fee5dc57e777641fc0bd044d5170a931e8750e8cf6d0838a20105206a7f312bf9c
SHA1 hash: bd0b932cf68537a5499ae90d8c6605c8102e1764
MD5 hash: b8bf5a67336558fe3e523c94b83c5f8c
humanhash: bakerloo-muppet-missouri-emma
File name:b8bf5a67336558fe3e523c94b83c5f8c.exe
Download: download sample
Signature ArkeiStealer
File size:7'413'013 bytes
First seen:2022-01-04 23:50:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JubXq7Umoi2sfDSwljIHVjwaFBvoXqacIMqMEVedp37:JuraN2wl8HVjDHwXwqhiF7
TLSH T135763329794DE06CFC9304F48C366B9E7F186C848E26A4926F44A3C653237562F4DFA7
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
185.151.240.132:33087

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://116.202.186.120/ https://threatfox.abuse.ch/ioc/290704/
185.151.240.132:33087 https://threatfox.abuse.ch/ioc/290926/

Intelligence


File Origin
# of uploads :
1
# of downloads :
199
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar onlyL
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 548024 Sample: ACAs6Kprey.exe Startdate: 05/01/2022 Architecture: WINDOWS Score: 100 72 52.182.143.212 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->72 74 185.14.30.149 ITLDC-NLUA Ukraine 2->74 76 4 other IPs or domains 2->76 96 Antivirus detection for URL or domain 2->96 98 Antivirus detection for dropped file 2->98 100 Antivirus / Scanner detection for submitted sample 2->100 102 21 other signatures 2->102 10 ACAs6Kprey.exe 10 2->10         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->46 dropped 13 setup_installer.exe 23 10->13         started        process6 file7 48 C:\Users\user\AppData\...\setup_install.exe, PE32 13->48 dropped 50 C:\Users\user\...\Sun15e0eb62d0151136.exe, PE32 13->50 dropped 52 C:\Users\user\...\Sun157e80c1171e7.exe, PE32 13->52 dropped 54 17 other files (7 malicious) 13->54 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 68 104.21.50.158 CLOUDFLARENETUS United States 16->68 70 127.0.0.1 unknown unknown 16->70 92 Adds a directory exclusion to Windows Defender 16->92 94 Disables Windows Defender (via service or powershell) 16->94 20 cmd.exe 16->20         started        22 cmd.exe 1 16->22         started        24 cmd.exe 16->24         started        26 10 other processes 16->26 signatures10 process11 signatures12 29 Sun157e80c1171e7.exe 20->29         started        34 Sun1524b2d49d.exe 22->34         started        36 Sun15691990b4.exe 24->36         started        104 Adds a directory exclusion to Windows Defender 26->104 106 Disables Windows Defender (via service or powershell) 26->106 38 Sun15292134315.exe 14 2 26->38         started        40 Sun15439ab1d3.exe 26->40         started        42 Sun150e7e056cad8b5c3.exe 26->42         started        44 5 other processes 26->44 process13 dnsIp14 78 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 29->78 80 103.155.92.143 TWIDC-AS-APTWIDCLimitedHK unknown 29->80 86 19 other IPs or domains 29->86 56 C:\Users\...\fHWFFYimfONnaNGkwxXMEff_.exe, PE32 29->56 dropped 58 C:\Users\user\AppData\...\toolspab2[1].exe, PE32 29->58 dropped 60 C:\Users\user\AppData\Local\...\setup[1].exe, PE32 29->60 dropped 66 41 other files (14 malicious) 29->66 dropped 108 Tries to harvest and steal browser information (history, passwords, etc) 29->108 110 Disable Windows Defender real time protection (registry) 29->110 112 Machine Learning detection for dropped file 34->112 114 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 34->114 116 Maps a DLL or memory area into another process 34->116 118 Checks if the current machine is a virtual machine (disk enumeration) 34->118 120 Writes to foreign memory regions 36->120 122 Sample uses process hollowing technique 36->122 124 Injects a PE file into a foreign processes 36->124 82 148.251.234.83 HETZNER-ASDE Germany 38->82 88 3 other IPs or domains 38->88 126 Antivirus detection for dropped file 38->126 62 C:\Users\user\AppData\Local\Temp\sss5xn.hk3, PE32 42->62 dropped 84 208.95.112.1 TUT-ASUS United States 44->84 90 3 other IPs or domains 44->90 64 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 44->64 dropped file15 signatures16
Threat name:
Win32.Hacktool.NirSoftPT
Status:
Malicious
First seen:
2021-12-27 02:50:00 UTC
File Type:
PE (Exe)
Extracted files:
324
AV detection:
31 of 43 (72.09%)
Threat level:
  1/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:915 botnet:userv1 aspackv2 backdoor infostealer spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.chosenncrowned.com/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
http://melchen-testet.at/upload/
http://zjymf.com/upload/
http://pbxbmu70275.cn/upload/
http://mnenenravitsya.ru/upload/
http://pitersprav.ru/upload/
159.69.246.184:13127
Unpacked files
SH256 hash:
7e4c288f060981b8cfd9c908997578b69ffc16438672f065bd50784fab3edcca
MD5 hash:
d7159e861f2881a05ace80394d805087
SHA1 hash:
3dcf96205f2a95ffdb3c463c264b68d7babe03a8
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
e5652b5152dcbebf7b937cc011d066bdf36dea66fe8e24de7fa3dcc72ab1e9ca
MD5 hash:
7e4290c2f5b38bc8cf9482b88af9d3e3
SHA1 hash:
4b9bd173e7a7480b2faf3ee3e026319fa3f76850
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
12f682423118581850910cddfb42e2ebb2851e4ec5c346c041f71a1dda51c057
MD5 hash:
029e5130789f584309502d7e23d6b3ec
SHA1 hash:
93f64300d51f9dbd6119c6aa4fdebecb44372758
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
9eb8863e63fb1c8f2e7f2367b87753b777d34129b0b456f9e0cd4acf10c8e457
MD5 hash:
a54b679b477cba77f451c11f72e1ab3c
SHA1 hash:
f4b32386d5497eab45685837bde72c3c9715590d
SH256 hash:
80aebcb8e45e90baf1f89f4ed94346cb01094faf14da43695a5ec034f73d61cf
MD5 hash:
91b30353bb2420306be00b0c2681a542
SHA1 hash:
1fbacff5adb16cb2b9c9f99c1969445b0786a79a
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
4cecc0318def671bb3b88863425337d2979d858f5080f7a7e2328594028be2a4
MD5 hash:
04fa6da3e51ac145130d3853486a2d0d
SHA1 hash:
b11520978a5ac825072311f2a869702b18b2b7d8
SH256 hash:
1b75cd2d7aec4ece113e7a9dcf36bc00cac9a66d5cdf893b6564dada0304dde6
MD5 hash:
1c9420724e01e74dd39452ab204b178f
SHA1 hash:
449a8906853622bab0f0ef1429c2cfdd76b7da0b
SH256 hash:
5d19671d3b11df4637204f2e0e09a4ebf87037585b53c97533d8e10084718fe6
MD5 hash:
d8b26d6ca31336f558b45d40f74df9dd
SHA1 hash:
3970f3c47476694fe4d066f66811596d2e1f1888
SH256 hash:
5a5384440f8d1b701edd510ab170eba851ee0e28f3bc878e71cb0bf44694adb5
MD5 hash:
0c46cd4ac3efa62fdb910fb6bcc14e14
SHA1 hash:
fd2d5596536445da22e7eb211e79d8ee8369845d
SH256 hash:
44f9b4529b1d344b343a09add3ac28c9e02206cf64ca577d2d516e9c4e5e24dd
MD5 hash:
5b59a545b7e5e28cfe3b0423ec0b65d0
SHA1 hash:
6bd6045138bba0caa90783c0e64894a366f397a8
SH256 hash:
bc782466665e51e00de06fecb8ac63fc62e25b131698ee0fc0a777b6f0001ac4
MD5 hash:
5f5602719c323abfbcb99198e30b7aa4
SHA1 hash:
338691584dad58badec7341fb8f4d4cd227ce589
SH256 hash:
190f4fb1b115015c5953c32d83b90e4574b371611ca78f6d37f6c0839b7be9b5
MD5 hash:
b8bf5a67336558fe3e523c94b83c5f8c
SHA1 hash:
bd0b932cf68537a5499ae90d8c6605c8102e1764
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments