MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d0a557a5d90912a78cd9f9e5358487b6e598b33f5f92046b51a1cae4b2df19c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 1d0a557a5d90912a78cd9f9e5358487b6e598b33f5f92046b51a1cae4b2df19c
SHA3-384 hash: 910d9b8dfa02d2f52f859d38c61b678046fb0852c1c822fd2e7a88d3e447e262fbc9b12e10953f15509245394495d13c
SHA1 hash: 07de8a47e09af1a2679183e758659a3e363564c9
MD5 hash: 63efa8c30663de8287e5be71ee54a5f5
humanhash: foxtrot-mirror-uncle-black
File name:63efa8c30663de8287e5be71ee54a5f5.exe
Download: download sample
Signature ArkeiStealer
File size:908'800 bytes
First seen:2021-05-31 10:31:07 UTC
Last seen:2021-05-31 12:17:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e5c53ac69abd36f904ba21b780dbe6c9 (5 x RaccoonStealer, 1 x ArkeiStealer, 1 x DanaBot)
ssdeep 24576:5dR8p9s9bBUZ19xPPxyFShecFVKkFCfD0HDr9Xjdco6eAs1q:5dq2UP08hecFV1ggHhjNF
Threatray 210 similar samples on MalwareBazaar
TLSH CD15F110AB90C034F1F116F6CA7946B959297DA16B2089CF1ED43AFE6B795E0AC31F07
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
63efa8c30663de8287e5be71ee54a5f5.exe
Verdict:
Suspicious activity
Analysis date:
2021-05-31 10:37:52 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Creating a process with a hidden window
Adding an access-denied ACE
Deleting a recently created file
Sending an HTTP GET request
Creating a process from a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Djvu Vidar
Detection:
malicious
Classification:
rans.phis.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found ransom note / readme
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Writes many files with high entropy
Yara detected Djvu Ransomware
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 427012 Sample: z591dniD7h.exe Startdate: 31/05/2021 Architecture: WINDOWS Score: 100 105 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->105 107 Multi AV Scanner detection for domain / URL 2->107 109 Found malware configuration 2->109 111 9 other signatures 2->111 12 z591dniD7h.exe 2->12         started        15 z591dniD7h.exe 2->15         started        17 z591dniD7h.exe 2->17         started        19 z591dniD7h.exe 2->19         started        process3 signatures4 123 Contains functionality to inject code into remote processes 12->123 125 Writes many files with high entropy 12->125 127 Injects a PE file into a foreign processes 12->127 21 z591dniD7h.exe 1 18 12->21         started        25 z591dniD7h.exe 15->25         started        27 z591dniD7h.exe 13 17->27         started        29 z591dniD7h.exe 19->29         started        process5 dnsIp6 89 api.2ip.ua 77.123.139.190, 443, 49711, 49722 VOLIA-ASUA Ukraine 21->89 91 192.168.2.1 unknown unknown 21->91 73 C:\Users\user\AppData\...\z591dniD7h.exe, PE32 21->73 dropped 75 C:\Users\...\z591dniD7h.exe:Zone.Identifier, ASCII 21->75 dropped 31 z591dniD7h.exe 21->31         started        34 icacls.exe 21->34         started        file7 process8 signatures9 129 Injects a PE file into a foreign processes 31->129 36 z591dniD7h.exe 1 27 31->36         started        process10 dnsIp11 85 asvb.top 35.235.74.220, 49724, 49725, 49726 GOOGLEUS United States 36->85 87 api.2ip.ua 36->87 65 Uninstall-PerUser_..._080432_10d0-cc.log, DOS 36->65 dropped 67 Install-PerUser_20...30551_1870-1874.log, DOS 36->67 dropped 69 C:\Users\user\AppData\...\AdobeSysFnt19.lst, DOS 36->69 dropped 71 161 other files (147 malicious) 36->71 dropped 113 Modifies existing user documents (likely ransomware behavior) 36->113 41 5.exe 36->41         started        44 updatewin1.exe 2 36->44         started        file12 signatures13 process14 signatures15 115 Machine Learning detection for dropped file 41->115 117 Injects a PE file into a foreign processes 41->117 46 5.exe 41->46         started        119 Antivirus detection for dropped file 44->119 121 Detected unpacking (overwrites its own PE header) 44->121 51 updatewin1.exe 44->51         started        process16 dnsIp17 93 api.faceit.com 104.17.62.50, 443, 49733 CLOUDFLARENETUS United States 46->93 95 162.55.189.102, 49734, 80 ACPCA United States 46->95 77 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 46->77 dropped 79 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 46->79 dropped 81 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 46->81 dropped 83 9 other files (none is malicious) 46->83 dropped 97 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 46->97 99 Tries to steal Instant Messenger accounts or passwords 46->99 101 Tries to harvest and steal browser information (history, passwords, etc) 46->101 103 2 other signatures 46->103 53 cmd.exe 46->53         started        55 powershell.exe 51->55         started        file18 signatures19 process20 process21 57 conhost.exe 53->57         started        59 taskkill.exe 53->59         started        61 timeout.exe 53->61         started        63 conhost.exe 55->63         started       
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-05-31 10:32:10 UTC
AV detection:
14 of 44 (31.82%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery persistence
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Modifies file permissions
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 1d0a557a5d90912a78cd9f9e5358487b6e598b33f5f92046b51a1cae4b2df19c

(this sample)

  
Delivery method
Distributed via web download

Comments