MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2df27f1a3505dbd0995188d49c253f5bc53c0e994954c4143da6d13efbba126e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 7 File information Comments

SHA256 hash: 2df27f1a3505dbd0995188d49c253f5bc53c0e994954c4143da6d13efbba126e
SHA3-384 hash: 6c58ecff099dac7f14397aa03155d1a34a99d23423df4b04bfdacd9403e1673d0b8c932c23927f486356f12a2ce279f5
SHA1 hash: 22ac946afef96396f90ea11eeb06f6c57fa378de
MD5 hash: e578c917f3478091a94ea5e7c47e7739
humanhash: maine-floor-oklahoma-floor
File name:2df27f1a3505dbd0995188d49c253f5bc53c0e994954c.exe
Download: download sample
Signature ArkeiStealer
File size:747'008 bytes
First seen:2021-03-30 11:35:43 UTC
Last seen:2021-03-30 13:10:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'642 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 12288:mXT33YgEtEb4ON0kcE5OFVXKEVjVAktew6Yqg7Y8SpvR+Cm/LkvivwFV+PVyve:mXjhEEk85OFVaEBVzQw7XS6NDkKveuh
Threatray 890 similar samples on MalwareBazaar
TLSH FDF401A03998DF95E62C53FA5064680057F5E3EA1013EF4D8ED8E4EE282AF4C4ED4B57
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
http://nmorbertomo.ac.ug/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://nmorbertomo.ac.ug/ https://threatfox.abuse.ch/ioc/6038/

Intelligence


File Origin
# of uploads :
2
# of downloads :
114
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b57244a20b1130978e1f49045ae571a6.exe
Verdict:
Malicious activity
Analysis date:
2021-03-30 11:24:30 UTC
Tags:
loader trojan stealer raccoon rat azorult remcos vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
DNS request
Deleting a recently created file
Reading critical registry keys
Running batch commands
Creating a process with a hidden window
Launching a process
Unauthorized injection to a recently created process
Stealing user critical data
Sending an HTTP GET request to an infection source
Sending an HTTP POST request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT Azorult Remcos
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Sample uses process hollowing technique
Sigma detected: Executable Used by PlugX in Uncommon Location
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected Azorult
Yara detected Azorult Info Stealer
Yara detected Remcos RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 378072 Sample: 2df27f1a3505dbd0995188d49c2... Startdate: 30/03/2021 Architecture: WINDOWS Score: 100 108 icacxndo.ac.ug 2->108 110 nothinglike.ac.ug 2->110 112 2 other IPs or domains 2->112 132 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->132 134 Found malware configuration 2->134 136 Malicious sample detected (through community Yara rule) 2->136 138 13 other signatures 2->138 11 2df27f1a3505dbd0995188d49c253f5bc53c0e994954c.exe 15 5 2->11         started        16 cmd.exe 2->16         started        18 Jksfmi.exe 2->18         started        20 taskkill.exe 2->20         started        signatures3 process4 dnsIp5 126 nmorbertomo.ac.ug 185.215.113.77, 49711, 49712, 49716 WHOLESALECONNECTIONSNL Portugal 11->126 104 C:\Users\user\AppData\Local\...\oxcvngfd.exe, PE32 11->104 dropped 106 2df27f1a3505dbd099...3c0e994954c.exe.log, ASCII 11->106 dropped 162 Injects a PE file into a foreign processes 11->162 22 2df27f1a3505dbd0995188d49c253f5bc53c0e994954c.exe 71 11->22         started        27 oxcvngfd.exe 3 11->27         started        29 voqsmzzj.exe 16->29         started        31 conhost.exe 16->31         started        128 162.159.134.233, 443, 49725 CLOUDFLARENETUS United States 18->128 130 cdn.discordapp.com 18->130 33 conhost.exe 20->33         started        file6 signatures7 process8 dnsIp9 118 moreirawag.ac.ug 22->118 94 C:\Users\user\AppData\Local\Temp\rc.exe, PE32 22->94 dropped 96 C:\Users\user\AppData\Local\Temp\ds2.exe, PE32 22->96 dropped 98 C:\Users\user\AppData\Local\Temp\ds1.exe, PE32 22->98 dropped 100 49 other files (1 malicious) 22->100 dropped 150 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->150 152 Tries to steal Instant Messenger accounts or passwords 22->152 154 Tries to steal Mail credentials (via file access) 22->154 160 4 other signatures 22->160 35 ac.exe 22->35         started        39 rc.exe 22->39         started        42 ds1.exe 22->42         started        48 2 other processes 22->48 156 Injects a PE file into a foreign processes 27->156 44 oxcvngfd.exe 188 27->44         started        158 Detected unpacking (overwrites its own PE header) 29->158 46 powershell.exe 29->46         started        file10 signatures11 process12 dnsIp13 80 C:\Users\user\AppData\Local\...\tmp79AB.tmp, XML 35->80 dropped 82 C:\Users\user\AppData\Roaming\gsHQIi.exe, PE32 35->82 dropped 140 Uses schtasks.exe or at.exe to add and modify task schedules 35->140 142 Injects a PE file into a foreign processes 35->142 50 ac.exe 35->50         started        53 schtasks.exe 35->53         started        120 cdn.discordapp.com 162.159.133.233, 443, 49720, 49735 CLOUDFLARENETUS United States 39->120 122 192.168.2.1 unknown unknown 39->122 84 C:\Users\Public\Libraries\Jksfmi\Jksfmi.exe, PE32 39->84 dropped 144 Sample uses process hollowing technique 39->144 55 ds1.exe 42->55         started        58 ds1.exe 42->58         started        124 nmorbertomo.ac.ug 44->124 86 C:\ProgramData\vcruntime140.dll, PE32 44->86 dropped 88 C:\ProgramData\sqlite3.dll, PE32 44->88 dropped 90 C:\ProgramData\softokn3.dll, PE32 44->90 dropped 92 4 other files (none is malicious) 44->92 dropped 146 Tries to harvest and steal browser information (history, passwords, etc) 44->146 148 Tries to steal Crypto Currency Wallets 44->148 60 cmd.exe 44->60         started        62 ds2.exe 48->62         started        64 conhost.exe 48->64         started        66 timeout.exe 48->66         started        file14 signatures15 process16 dnsIp17 114 icacxndo.ac.ug 50->114 116 icando.ug 194.5.98.107, 49724, 49726, 49734 DANILENKODE Netherlands 50->116 68 conhost.exe 53->68         started        102 C:\Windows\Temp\voqsmzzj.exe, PE32 55->102 dropped 70 cmstp.exe 55->70         started        72 conhost.exe 60->72         started        74 taskkill.exe 60->74         started        76 powershell.exe 62->76         started        file18 process19 process20 78 conhost.exe 76->78         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-30 11:36:07 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:azorult family:oski discovery infostealer spyware stealer trojan
Behaviour
Checks processor information in registry
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Azorult
Oski
Malware Config
C2 Extraction:
http://195.245.112.115/index.php
Unpacked files
SH256 hash:
072dd36c2eb0c56968a0a09c6b14198d1de42f19520cdc95301ecc01916c2245
MD5 hash:
2cf58873b259f9cff799f76697dddb43
SHA1 hash:
ba9064e48b1b7fc7f131b67c52dd0bc8c02fa6d4
Detections:
win_azorult_g1 win_azorult_auto
SH256 hash:
60c71537e538ab063378abfabce22d1a168c82cff21e14ea204e5f140f8439dc
MD5 hash:
1b47ebbbd14cf0c4a10aa0771349c26f
SHA1 hash:
35c76f43a3545d7bdd542ced39e1d0022b9f2a50
SH256 hash:
fdccaed76f7279e6b8cc1579dadeed03fa1b8d1adcdfbcac585a68da168366d5
MD5 hash:
8b603b23caf00139206f293eb741a9f0
SHA1 hash:
1cc90aec7ce07b13930fe0c088fe3cd155b3ea07
SH256 hash:
2df27f1a3505dbd0995188d49c253f5bc53c0e994954c4143da6d13efbba126e
MD5 hash:
e578c917f3478091a94ea5e7c47e7739
SHA1 hash:
22ac946afef96396f90ea11eeb06f6c57fa378de
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:asyncrat
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse
Author:ditekSHen
Description:Detects file containing reversed ASEP Autorun registry keys
Rule name:REMCOS_RAT_variants
Rule name:Reverse_text_bin_mem
Author:James_inthe_box
Description:Reverse text detected
Rule name:win_asyncrat_j1
Author:Johannes Bader @viql
Description:detects AsyncRAT
Rule name:win_asyncrat_w0
Author:JPCERT/CC Incident Response Group
Description:detect AsyncRat in memory
Reference:internal research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 2df27f1a3505dbd0995188d49c253f5bc53c0e994954c4143da6d13efbba126e

(this sample)

  
Delivery method
Distributed via web download

Comments