MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 21a58de4fc0e1f1eae034d9f6fae3c405c8658fb949d8b8676ed38550c4702c4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 10 File information Comments

SHA256 hash: 21a58de4fc0e1f1eae034d9f6fae3c405c8658fb949d8b8676ed38550c4702c4
SHA3-384 hash: ce99590f3299e7d0847c1ae0d7954e1ace6ba48bf8bfee819ffe28cc8bacbbdaea733d56ac534c3d55218a19dbcbe5dd
SHA1 hash: b7bb3a18e5dce74a353bc4ed5c6729a65a4a5522
MD5 hash: 5445fae4a11089f07bc1362a48623cd9
humanhash: california-seven-louisiana-lithium
File name:5445fae4a11089f07bc1362a48623cd9
Download: download sample
Signature ArkeiStealer
File size:5'769'669 bytes
First seen:2021-06-27 18:23:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 98304:pAI+sp+goreqMswPavGIM45Uz8hyraVTe5fh8ndc3sTUgAGQ8VjuqvqD4rtI1aK:itsp+gyhio5UzQbMBZgAGQ8sqvgD1N
Threatray 150 similar samples on MalwareBazaar
TLSH 1046333A63418777D2A02979580BB2BBB52F77890F3922CF17C94D7A1C2271927F4369
Reporter zbetcheckin
Tags:32 ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
117
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
main_setup_x86x64.exe
Verdict:
Malicious activity
Analysis date:
2021-06-27 15:37:49 UTC
Tags:
trojan loader stealer vidar evasion rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Drops executable to a common third party application directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Searches for Windows Mail specific files
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 441016 Sample: 9irkb5Rbn8 Startdate: 27/06/2021 Architecture: WINDOWS Score: 100 190 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->190 192 Multi AV Scanner detection for domain / URL 2->192 194 Found malware configuration 2->194 196 15 other signatures 2->196 10 9irkb5Rbn8.exe 14 15 2->10         started        13 svchost.exe 2->13         started        16 svchost.exe 2->16         started        18 3 other processes 2->18 process3 file4 142 C:\Program Files (x86)\...\lylal220.exe, PE32 10->142 dropped 144 C:\Program Files (x86)\...\hjjgaa.exe, PE32 10->144 dropped 146 C:\Program Files (x86)\...\guihuali-game.exe, PE32 10->146 dropped 148 5 other files (4 malicious) 10->148 dropped 20 MediaBurner.exe 2 10->20         started        23 LabPicV3.exe 10->23         started        25 RunWW.exe 91 10->25         started        31 4 other processes 10->31 222 System process connects to network (likely due to code injection or exploit) 13->222 224 Sets debug register (to hijack the execution of another thread) 13->224 226 Modifies the context of a thread in another process (thread injection) 13->226 29 svchost.exe 13->29         started        signatures5 process6 dnsIp7 124 C:\Users\user\AppData\...\MediaBurner.tmp, PE32 20->124 dropped 33 MediaBurner.tmp 3 19 20->33         started        126 C:\Users\user\AppData\Local\...\LabPicV3.tmp, PE32 23->126 dropped 37 LabPicV3.tmp 23->37         started        176 159.69.20.131, 49726, 80 HETZNER-ASDE Germany 25->176 178 sergeevih43.tumblr.com 74.114.154.18, 443, 49724 AUTOMATTICUS Canada 25->178 128 C:\Users\user\AppData\...\softokn3[1].dll, PE32 25->128 dropped 130 C:\Users\user\AppData\...\freebl3[1].dll, PE32 25->130 dropped 138 10 other files (none is malicious) 25->138 dropped 214 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 25->214 216 Tries to harvest and steal browser information (history, passwords, etc) 25->216 218 Tries to steal Crypto Currency Wallets 25->218 39 cmd.exe 25->39         started        180 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 29->180 220 Query firmware table information (likely to detect VMs) 29->220 182 ip-api.com 208.95.112.1, 49715, 80 TUT-ASUS United States 31->182 184 88.99.66.31 HETZNER-ASDE Germany 31->184 186 4 other IPs or domains 31->186 132 C:\Users\user\AppData\Roaming\2458129.exe, PE32 31->132 dropped 134 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 31->134 dropped 136 C:\Users\user\AppData\Roaming\5354358.exe, PE32 31->136 dropped 140 3 other files (none is malicious) 31->140 dropped 41 rundll32.exe 31->41         started        44 lylal220.tmp 31->44         started        46 2458129.exe 31->46         started        48 5 other processes 31->48 file8 signatures9 process10 dnsIp11 166 idowload.com 185.227.110.219, 49718, 49720, 49721 LEASEWEB-NL-AMS-01NetherlandsNL Netherlands 33->166 84 C:\Users\user\AppData\...\tiliqsn _  _.exe, PE32 33->84 dropped 98 3 other files (none is malicious) 33->98 dropped 50 tiliqsn _  _.exe 33->50         started        86 C:\Users\user\AppData\Local\...\bkhgb _ -.exe, PE32 37->86 dropped 88 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 37->88 dropped 90 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 37->90 dropped 92 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 37->92 dropped 55 bkhgb _ -.exe 37->55         started        57 conhost.exe 39->57         started        59 taskkill.exe 39->59         started        61 timeout.exe 39->61         started        204 Writes to foreign memory regions 41->204 206 Allocates memory in foreign processes 41->206 208 Creates a thread in another existing process (thread injection) 41->208 94 C:\Users\user\AppData\...\dqksjh  (  .exe, PE32 44->94 dropped 100 3 other files (none is malicious) 44->100 dropped 63 dqksjh  (  .exe 44->63         started        96 C:\Users\user\AppData\...\WinHoster.exe, PE32 46->96 dropped 210 Creates multiple autostart registry keys 46->210 65 WinHoster.exe 46->65         started        168 192.168.2.1 unknown unknown 48->168 212 Tries to harvest and steal browser information (history, passwords, etc) 48->212 file12 signatures13 process14 dnsIp15 102 C:\Program Files\...\ultramediaburner.exe, PE32 50->102 dropped 104 C:\Program Files (x86)\...\SHemokasaqi.exe, PE32 50->104 dropped 106 C:\...\SHemokasaqi.exe.config, XML 50->106 dropped 114 2 other files (none is malicious) 50->114 dropped 198 Drops executable to a common third party application directory 50->198 67 ultramediaburner.exe 50->67         started        70 Suhucufaru.exe 50->70         started        170 162.0.220.187 ACPCA Canada 55->170 108 C:\Program Files (x86)\...\Qaefynugaso.exe, PE32 55->108 dropped 110 C:\...\Qaefynugaso.exe.config, XML 55->110 dropped 112 C:\Users\user\AppData\...\Suraefaeraly.exe, PE32 55->112 dropped 116 2 other files (none is malicious) 55->116 dropped 200 Creates multiple autostart registry keys 55->200 72 prolab.exe 55->72         started        74 Pijaewacyga.exe 55->74         started        77 Suraefaeraly.exe 55->77         started        172 173.222.108.226 AKAMAI-ASN1EU United States 63->172 174 connectini.net 162.0.210.44, 443, 49727 ACPCA Canada 63->174 118 2 other files (none is malicious) 63->118 dropped 202 Searches for Windows Mail specific files 63->202 file16 signatures17 process18 dnsIp19 120 C:\Users\user\...\ultramediaburner.tmp, PE32 67->120 dropped 79 ultramediaburner.tmp 67->79         started        122 C:\Users\user\AppData\Local\...\prolab.tmp, PE32 72->122 dropped 82 prolab.tmp 72->82         started        188 216.58.212.132 GOOGLEUS United States 74->188 file20 process21 file22 150 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 79->150 dropped 152 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 79->152 dropped 154 C:\Program Files (x86)\...\is-LESNV.tmp, PE32 79->154 dropped 156 C:\Program Files (x86)\...\is-2DJ8I.tmp, PE32 79->156 dropped 158 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 82->158 dropped 160 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 82->160 dropped 162 C:\Program Files (x86)\...\is-VLITA.tmp, PE32 82->162 dropped 164 8 other files (none is malicious) 82->164 dropped
Threat name:
Win32.Trojan.Fabookie
Status:
Malicious
First seen:
2021-06-26 17:42:58 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:vidar discovery evasion persistence spyware stealer trojan upx vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
VMProtect packed file
Checks for common network interception software
Vidar Stealer
PlugX
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
01808f7bce25db18bce99e432555fcfff148a1d931128edebc816975145cabd7
MD5 hash:
5e6df381ce1c9102799350b7033e41df
SHA1 hash:
f8a4012c9547d9bb2faecfba75fc69407aaec288
SH256 hash:
b26d99296cc1f38ad735c36a305eb206b8a9022e92b463886ed918f42dee0b04
MD5 hash:
9decb9ebf19e4e45bd75f175140e1018
SHA1 hash:
c9d35d2bc78dd37270dbe17f2555324c6f560d11
SH256 hash:
92b44a28ee931b48ee35a21ff6f3edb31dcf6dbd990d1d94a87c0c74b4d270b7
MD5 hash:
2ecc112feef09200552d497ff733ebca
SHA1 hash:
d23e72447049280df688a36d7f23706842d90c4d
SH256 hash:
6c71792feaabf25adaa8d7d8e80905d8d8d806b41d5b9f11e1645f97723e7347
MD5 hash:
bd702486d9e6608730395ffd92601ea4
SHA1 hash:
74270bab49faac56f12fc63fe510d9dcc93b9c5f
SH256 hash:
f73d81974b6d37651aa59b2b642429babda60c9a81bdc64c228ca786ad11ffa0
MD5 hash:
10967a98883769ce595d8d35a8d9389d
SHA1 hash:
4434f2febeacd3a28fca57acf826f8fd268800a6
SH256 hash:
6bea897b06441f33f33764c26f62c206666a204768cf3e5c0ae6912d8e86780f
MD5 hash:
128250f29b71047e68f7b2ba44b10535
SHA1 hash:
fc7fbe41eec8ac9e286451ade80a2f5c7abddc1c
SH256 hash:
a96fe88b71af48c72b9bbf77aceba1bfb75b5c8ae32cc983fcd610906d6f9fa0
MD5 hash:
013312bdea2b89098dfbbe0d68aa8173
SHA1 hash:
551d4740dbaa4e939778c0aeae71be39d0af2e6a
SH256 hash:
05e2763705613655fc8d4431602ccb469f240207c54bac899310a8d9598842a8
MD5 hash:
a03d890aecf0f1b5695f6d81f50559be
SHA1 hash:
2d0fe5ed933f856c8d6955b41aa9da455e5a7e61
SH256 hash:
dca51917b66b19750c4bb45d2893261fcbf64700c3786aba800bc3152072479e
MD5 hash:
dd711b0935cd238c8a1facff7cfa8a06
SHA1 hash:
0bdacab3eeea8f56397701f402a4deb8ba6da813
SH256 hash:
21a58de4fc0e1f1eae034d9f6fae3c405c8658fb949d8b8676ed38550c4702c4
MD5 hash:
5445fae4a11089f07bc1362a48623cd9
SHA1 hash:
b7bb3a18e5dce74a353bc4ed5c6729a65a4a5522
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 21a58de4fc0e1f1eae034d9f6fae3c405c8658fb949d8b8676ed38550c4702c4

(this sample)

  
Delivery method
Distributed via web download

Comments