MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3f4b6ad0ebd72f4cd135f72266a7fb9d2f11aa7081a7234b5fc5b24a1a765e41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ArkeiStealer
Vendor detections: 11
| SHA256 hash: | 3f4b6ad0ebd72f4cd135f72266a7fb9d2f11aa7081a7234b5fc5b24a1a765e41 |
|---|---|
| SHA3-384 hash: | 32c1f259ecd261a0e0e65ad379d72b8285a53b06bd732dea78b92480c3762cb6591931622b6a21e7ee7b513d5ce6c33d |
| SHA1 hash: | 2a041dd30f3948dda4361cf2023be32742e48781 |
| MD5 hash: | b67cdf6e4003ac3f087650b55a5291da |
| humanhash: | monkey-music-oxygen-bakerloo |
| File name: | b67cdf6e4003ac3f087650b55a5291da.exe |
| Download: | download sample |
| Signature | ArkeiStealer |
| File size: | 713'728 bytes |
| First seen: | 2021-09-26 06:51:10 UTC |
| Last seen: | 2021-09-26 08:05:37 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 062d438af0a5427d47d2119e831026d3 (27 x RedLineStealer, 8 x RaccoonStealer, 4 x ArkeiStealer) |
| ssdeep | 12288:pzeGNBHvcCryiVY8dGvRkPEnolcTbiILOJKWOhfEtzwHeEijJOzP7vd:VeGNBPcCrLOvacol8biywKWqeEeEoCTv |
| Threatray | 719 similar samples on MalwareBazaar |
| TLSH | T1B4E412E0B7A2C433DBA381701AA0C635563FB8335D776287E74D53AB1E207915AF532A |
| File icon (PE): | |
| dhash icon | fcfcb4f4d4d4d8c0 (19 x RedLineStealer, 16 x RaccoonStealer, 14 x Smoke Loader) |
| Reporter | |
| Tags: | ArkeiStealer exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
190
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b67cdf6e4003ac3f087650b55a5291da.exe
Verdict:
Suspicious activity
Analysis date:
2021-09-26 06:53:43 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
Vidar
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Connection attempt to an infection source
Sending an HTTP GET request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Query of malicious DNS domain
Malware family:
STOP Ransomware
Verdict:
Malicious
Result
Threat name:
Djvu Vidar
Detection:
malicious
Classification:
rans.spre.troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Djvu Ransomware
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-09-26 01:51:23 UTC
AV detection:
24 of 45 (53.33%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 709 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:djvu family:vidar discovery persistence ransomware spyware stealer suricata
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Detected Djvu ransomware
Djvu Ransomware
Vidar
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Unpacked files
SH256 hash:
52abed372fef8c6f6d2f618af456f01bb7840f6a20aeeac882e72f751e8c6c0b
MD5 hash:
0419ceafccad7b4aeeff524530093486
SHA1 hash:
89f265a3036b5642319c49b4f9f89defcc2617ad
Detections:
win_stop_auto
Parent samples :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 hash:
3f4b6ad0ebd72f4cd135f72266a7fb9d2f11aa7081a7234b5fc5b24a1a765e41
MD5 hash:
b67cdf6e4003ac3f087650b55a5291da
SHA1 hash:
2a041dd30f3948dda4361cf2023be32742e48781
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.