MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3388a56f197f69a0888f68c24492af10f2bfd16d7d0f9ddc6e6e8dcaaec6d2a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 3388a56f197f69a0888f68c24492af10f2bfd16d7d0f9ddc6e6e8dcaaec6d2a5
SHA3-384 hash: 73317d3f4404394fcf3c9a2af6d379db649c28e6aada43228e59875abfd32d54ea2a2cd73d744e80b36bb99f3539eed5
SHA1 hash: 4af51ed5f320ca12066ff1b8044a0b2dc1de5142
MD5 hash: d6d53db28983ca7f5c994892bc580ae2
humanhash: thirteen-shade-seven-hamper
File name:b1e507edf98c04f408530c8cfb13cf60
Download: download sample
Signature ArkeiStealer
File size:706'560 bytes
First seen:2020-11-17 15:12:32 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b831d380405f32be656172bf4f384195 (8 x ArkeiStealer, 4 x RedLineStealer)
ssdeep 12288:rVx8Ejs++3d145UM+mnsR9m22akPTQegE:Bts++3eFnsR9mBhs
TLSH 71E4F10136E1C9BAC097053C185497606632BC25F7B5CD83B7942F5BAEB42E26AF6F07
Reporter seifreed
Tags:ArkeiStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
64
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
DNS request
Connection attempt
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2020-11-17 15:21:50 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments