MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a9103251afe0c1ef6438869cd7f2ab6a9cd3ba724d527bd41dc58834a800256. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 12


Intelligence 12 IOCs 3 YARA 8 File information Comments

SHA256 hash: 2a9103251afe0c1ef6438869cd7f2ab6a9cd3ba724d527bd41dc58834a800256
SHA3-384 hash: 5dfe5786fe32c2e4796a1e5517e25053dcb454febaa3719eac335ee40ba42f6c74b4e8db2e1db4c11f71fa61c3a56d6d
SHA1 hash: e0170b396aaf9b3000b2a3adbf4ff41b65533a58
MD5 hash: 32e8fe0da562bd13577d82758e8e8c34
humanhash: johnny-lion-moon-table
File name:2A9103251AFE0C1EF6438869CD7F2AB6A9CD3BA724D52.exe
Download: download sample
Signature ArkeiStealer
File size:15'276'589 bytes
First seen:2022-01-19 17:41:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 393216:xudgS0oqDQH4vQeS4bbMe3GCkbmjED0MBQ8pn:4dgRo0hQeT3MCGCkdY8n
Threatray 2'187 similar samples on MalwareBazaar
TLSH T15AF6338A2804D07DDF0EE1785ACCFEB25AF952504726CDABD799C4992BF0490FD5B232
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
185.215.113.10:39759

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.10:39759 https://threatfox.abuse.ch/ioc/299070/
45.9.20.111:1355 https://threatfox.abuse.ch/ioc/303028/
http://appwebstat.biz/info.php https://threatfox.abuse.ch/ioc/303029/

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2A9103251AFE0C1EF6438869CD7F2AB6A9CD3BA724D52.exe
Verdict:
No threats detected
Analysis date:
2022-01-20 04:44:10 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
DNS request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected AntiVM3
Yara detected onlyLogger
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 556188 Sample: 2A9103251AFE0C1EF6438869CD7... Startdate: 19/01/2022 Architecture: WINDOWS Score: 100 60 ip-api.com 208.95.112.1, 49771, 80 TUT-ASUS United States 2->60 62 91.219.236.27, 80 SERVERASTRA-ASHU Hungary 2->62 64 12 other IPs or domains 2->64 76 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->76 78 Multi AV Scanner detection for domain / URL 2->78 80 Antivirus detection for URL or domain 2->80 82 28 other signatures 2->82 10 2A9103251AFE0C1EF6438869CD7F2AB6A9CD3BA724D52.exe 27 2->10         started        signatures3 process4 file5 44 C:\Users\user\AppData\...\setup_install.exe, PE32 10->44 dropped 46 C:\Users\user\AppData\...\Wed18d4254c72.exe, PE32+ 10->46 dropped 48 C:\Users\user\...\Wed18c93e6a4c37eb6.exe, PE32 10->48 dropped 50 22 other files (16 malicious) 10->50 dropped 13 setup_install.exe 1 10->13         started        process6 signatures7 106 Adds a directory exclusion to Windows Defender 13->106 108 Disables Windows Defender (via service or powershell) 13->108 16 cmd.exe 1 13->16         started        18 cmd.exe 13->18         started        20 cmd.exe 13->20         started        22 7 other processes 13->22 process8 signatures9 25 Wed185c6357e2.exe 16->25         started        28 Wed186c6b4837756.exe 18->28         started        32 Wed18313399a3.exe 20->32         started        84 Adds a directory exclusion to Windows Defender 22->84 86 Disables Windows Defender (via service or powershell) 22->86 34 Wed18491d72c8536a603.exe 22->34         started        36 Wed18bd95bf0223c.exe 22->36         started        38 Wed1829098efa3e.exe 22->38         started        40 2 other processes 22->40 process10 dnsIp11 88 Antivirus detection for dropped file 25->88 90 Query firmware table information (likely to detect VMs) 25->90 92 Tries to detect sandboxes and other dynamic analysis tools (window names) 25->92 104 2 other signatures 25->104 66 one-mature-tube.me 104.21.39.198, 443, 49786 CLOUDFLARENETUS United States 28->66 52 923e44b9-b11d-4bf5-aeb3-810682a14a8f.exe, PE32 28->52 dropped 54 7b043861-4485-4bcf-b25f-8ed9875128f7.exe, PE32 28->54 dropped 56 045a1395-3032-4afb-914a-8310e19234eb.exe, PE32 28->56 dropped 58 b8ae9ff3-2afb-4f3a-aac8-3944884e7112.exe, PE32 28->58 dropped 94 Detected unpacking (changes PE section rights) 28->94 96 Machine Learning detection for dropped file 28->96 68 212.193.30.45, 49759, 49761, 80 SPD-NETTR Russian Federation 32->68 70 2.56.59.42, 49760, 80 GBTCLOUDUS Netherlands 32->70 98 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 32->98 72 mstdn.social 116.202.14.219, 443, 49766, 49768 HETZNER-ASDE Germany 34->72 74 koyu.space 95.217.25.51, 443, 49767, 49770 HETZNER-ASDE Germany 34->74 100 Injects a PE file into a foreign processes 36->100 42 Wed18bd95bf0223c.exe 36->42         started        102 Adds a directory exclusion to Windows Defender 38->102 file12 signatures13 process14
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2022-01-16 02:40:00 UTC
File Type:
PE (Exe)
Extracted files:
442
AV detection:
29 of 43 (67.44%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:onlylogger family:raccoon family:redline family:socelars family:vidar botnet:4da27d123a577c68e42716053343dd3f8da508a2 botnet:915 botnet:@tui botnet:media8testplus aspackv2 discovery dropper evasion infostealer loader persistence spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Modifies Windows Firewall
Possible attempt to disable PatchGuard
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Vidar Stealer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies boot configuration data using bcdedit
Glupteba
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Windows security bypass
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Malware Config
C2 Extraction:
http://www.wgqpw.com/
185.215.113.44:23759
https://mstdn.social/@sergeev43
https://koyu.space/@sergeev45
65.108.69.168:16278
Unpacked files
SH256 hash:
2a9103251afe0c1ef6438869cd7f2ab6a9cd3ba724d527bd41dc58834a800256
MD5 hash:
32e8fe0da562bd13577d82758e8e8c34
SHA1 hash:
e0170b396aaf9b3000b2a3adbf4ff41b65533a58
SH256 hash:
1908cac443610b332e8adfc72481d2a225b72e679ff468d1643782e9c2d96e7c
MD5 hash:
60d12965e7dd763580b316f0743731c6
SHA1 hash:
54b2f29a834a6f9e931a19e3f53c27a132e19c19
SH256 hash:
a16b0da2cb8321a95bd558572530310822b4d0cef5775579ff6e255ab1ebe79d
MD5 hash:
1e53a122978ff250ff3411becdc375b9
SHA1 hash:
6f69cc6ae6c713c3bbe67c265d764b573fdae16d
SH256 hash:
b3a243149949327349c4fce0bd153e477de376b2ed146330d4345b60a3925d63
MD5 hash:
5edd166a963a028a82cbe38dad7fb7ad
SHA1 hash:
4a9e4f8b7820f5c5859f1ae61d4ec8697f4b43f6
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
da37723dbc887717a85940cdc3bda4a630d31e94a7af355558452a7c8d8ca5de
MD5 hash:
18f6ecc14ec6cbf833e7ab3dd31b5b36
SHA1 hash:
c2da6b4b158331a7f7bb9fa47f111e6fec7b8ecb
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
3bb55b0de90de0cc651dba71c869675c4fb5cfd1b9b21bd4957f1680f7506f06
MD5 hash:
f9d056f1d085e83a64c8ef2ba5f3be52
SHA1 hash:
bf04d73f991d0e45d459a5341593524e4e498801
SH256 hash:
b19104b568ca3ddccc2a8d3d10ecddb1ea240171e798dc3a486292cfa14b6365
MD5 hash:
7b0900da932f4ed9630d65b04422736d
SHA1 hash:
6fa340436e3a8e73ae2b3e911f861483183c68ef
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
d51ab967ebe9743a94b1a8c25d6495b3f29ad5db65e8ff24fdccd3f4cf9468b3
MD5 hash:
a63ebf5064a9afb6bfdf62692c12a4ec
SHA1 hash:
d1a16d3e0da466448d3e653cc5bca7db7a42e312
SH256 hash:
a9ce388d6bf8993725554fd178640ac10d8a194194f4f09b31e0465b83a975b0
MD5 hash:
33b0faae2f9635e7650cde45e82a12ba
SHA1 hash:
0acbfbbf81760a70b05f617717eee9ff4b4aacdc
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
e872344ca4c82587001c1fe3dc69d48c400d77f7b4a1542632ee95e41621025d
MD5 hash:
6b4d4262afc607f1a75e82823d98f5c0
SHA1 hash:
ec58dff2695e23d9521dc9810bdfea2ebfb01db6
SH256 hash:
bf4b51464cdec0703f1e6f9e45f32d1585f0a3e323231caeb46bf657921f5ea6
MD5 hash:
bea5ddd71cbec5fe84c65d29d802efe2
SHA1 hash:
dc40f8f728154b15497484dc8e77ea39cc3376a8
SH256 hash:
64317ea88e4a66f651aeff17e7baa7a140836db94406b004a2ee213c6916cca5
MD5 hash:
69f7b12de72604fece6d4139a2922569
SHA1 hash:
d1a12bdc4db8f566e21be7b64c3f9d414bf08707
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
5505adddd3b86b94d5940c305e75d86168af44f5f405edb00484be7bcbe9e2b2
MD5 hash:
b5a301b6d727f684d9d62ff230006dc1
SHA1 hash:
be840e49732f2bac1acad150e4db15c00ae4c9e9
SH256 hash:
549cc539bcaad35e240d808d5b5a6b26f12ab635698762bb7e4ddc35713fc6b9
MD5 hash:
a0e757203ff8e9171f2b94ed93b413b6
SHA1 hash:
ba54f2ea85d2b7220b920e136e6b6cde5de78540
SH256 hash:
5fea310a9485abf8560b457e57088c1362c3c5013d6550d51810a4921ffd3ede
MD5 hash:
6571b98fdca059a7475a23becd09b815
SHA1 hash:
af76263c9e5004080fb4b516129bf33755a4b913
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
ab1615b1610ff82b6ea0a14ff8dd04179e562f9db57a86be92802515d198fe15
MD5 hash:
e6f60c8edb98379a748b74ecb9a812f8
SHA1 hash:
3bb796d59cf92baaac7fa201c0af20ef971a5c49
SH256 hash:
2fa978cd29bd50258f17ac8879eb9a4abeb5a860011ad2821560206e31f72472
MD5 hash:
2f8a4afefba470b168b7affef8a25609
SHA1 hash:
2deb9a9013f80b87bb573533ceda57cc93aa5d26
SH256 hash:
ebb4cf0c7536545ce11d37cf3348148f6f7f8865afa91dd8f6bb2b11c9c339b2
MD5 hash:
1111c5898035f121ce856924daa7fb30
SHA1 hash:
2547e7fdcf77b837749c25d5485aa5efac746153
SH256 hash:
3e627ea5a0a3ed72c6f60b3a9c3ee0a2264cc22178ea20aba1cedb43919a60e3
MD5 hash:
ebfee6765c7e448e3ea21b40550d1a70
SHA1 hash:
08464d94727b3a9f523b93ddbaf21191c65214e5
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
9c00e935a41bb1dc0b2b65ac18c0a1be05bdc555676e7eb8a830590b52e55436
MD5 hash:
e7526d8f9a8f888b75b85f9a1ebae3dc
SHA1 hash:
79ca1cbf3184302db8defa924c43295106021c7e
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
054e221094dac977a40bece70c666d78c1d5b0cccebe46b8365f92b12862aac2
MD5 hash:
bddefed1abeb013ef551a32d6017cbac
SHA1 hash:
e561d913d7c58cae3dc2ec495c32fa99c0d99345
SH256 hash:
408a8283f4f6a1b894446515878a514ad2bbe89b1be51c4e519581eac3a9a5e3
MD5 hash:
91d46db076be989215b9f140a346a388
SHA1 hash:
4008bf25aa279f4abdb1e457c3217dd612bd360c
SH256 hash:
563d5c85b27fb2ccf4cbc0ed19dd00b3526bd5afad6d553392928e4c08389b42
MD5 hash:
06d4c2693221ba194753ba961043bdc5
SHA1 hash:
9b9cefce9ef0a37c83ce38c0bc45207bea4f065f
SH256 hash:
d886d9830dc2ce465849e2bd609bedacfb5a88cbcef26e4be0384e74f33d2e57
MD5 hash:
039b6fd78a5a0f0714d65dccad2fc633
SHA1 hash:
50ed233f765527ebde8aa876a0f5ff12bda1d1f1
SH256 hash:
7f0577e5a9753d910cc1a217d0bd6b8ba635b77c44c295d0afa84eb7f920aa99
MD5 hash:
e659e9eeeed0b670086e901c438a765b
SHA1 hash:
5a52e4a1886182525d93249b01cd53d6429bd4ed
SH256 hash:
dcfbced7e75d88b4b637eaacc02fbbb27028c2b3f123113e9552ad79c705c9b2
MD5 hash:
1bb2cf4a09b0a51d4477ef6d34696fbd
SHA1 hash:
d61a5de50cd738a82394517ec2401b0c51eaaef0
SH256 hash:
f8fd9ea70d3ce0eb266d2da38bd7346d81915adcead9aa5004666ed7a06a8efd
MD5 hash:
14d300bff986199712c6a87430908c21
SHA1 hash:
8123575ba9b56d3944254bd58fdb7ba84a294aa2
SH256 hash:
af75ca9db050cdf0c9c3f4bca27784d4be1809e3d86d9e6f118dc91f466e1835
MD5 hash:
084351a39f8a20961c59f1ca294dd740
SHA1 hash:
d1da496973a77b45de0c3b81b08dcadb8bff7d16
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments