MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 446736e381fa8942f8d32cb4f2ae8fb6a9245fa0e70b7f7298ee7a5cb6fe9f32. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: 446736e381fa8942f8d32cb4f2ae8fb6a9245fa0e70b7f7298ee7a5cb6fe9f32
SHA3-384 hash: 254ebd52e45528f5ea0c8cdb8ebea11e5f3fc22f8b8cf358cf6a0aecb304e197a46e1aee59553b199424a24be5bb6bdc
SHA1 hash: e44b66c8dccfc544b38f6607ae58e100867df043
MD5 hash: f8fa0dfbd7f850d4627db88616bac7f5
humanhash: fish-summer-moon-quebec
File name:f8fa0dfbd7f850d4627db88616bac7f5.exe
Download: download sample
Signature ArkeiStealer
File size:6'790'000 bytes
First seen:2021-09-30 15:19:19 UTC
Last seen:2021-11-25 12:35:55 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0ab020de3096b6aafb4fadfac4d16825 (16 x CryptBot, 3 x ArkeiStealer, 3 x LockBit)
ssdeep 98304:pH7CgqLPRPYv7cZuwYx72XPo0+Xv6zV470d7pz7dTH3OHMNsZlQUafCyr3Ey6Nho:d+gqLKB2pscuopz7dTeNmfCyk+2OPhX
Threatray 46 similar samples on MalwareBazaar
TLSH T18066E130768BC52BD5A604B15A3CDB9F51287FB60F6290D7A3E42E6E45B48C35332E27
File icon (PE):PE icon
dhash icon 6ded69c7b130b2c0 (12 x CryptBot, 8 x ValleyRAT, 4 x NetSupport)
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6292405991145472.zip
Verdict:
Malicious activity
Analysis date:
2021-09-30 08:32:02 UTC
Tags:
trojan loader rat redline evasion stealer opendir vidar raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
72 / 100
Signature
.NET source code contains in memory code execution
Found many strings related to Crypto-Wallets (likely being stolen)
Multi AV Scanner detection for domain / URL
PE file has a writeable .text section
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 494472 Sample: yvY2AMOxwb.exe Startdate: 30/09/2021 Architecture: WINDOWS Score: 72 43 Multi AV Scanner detection for domain / URL 2->43 45 Yara detected Vidar stealer 2->45 47 Found many strings related to Crypto-Wallets (likely being stolen) 2->47 49 2 other signatures 2->49 7 evreporter.exe 127 2->7         started        12 yvY2AMOxwb.exe 268 2->12         started        14 msiexec.exe 2->14         started        16 msiexec.exe 2->16         started        process3 dnsIp4 41 185.215.113.39, 49752, 80 WHOLESALECONNECTIONSNL Portugal 7->41 27 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 7->27 dropped 29 C:\ProgramData\sqlite3.dll, PE32 7->29 dropped 51 Tries to harvest and steal browser information (history, passwords, etc) 7->51 18 cmd.exe 1 7->18         started        31 C:\Users\user\AppData\Roaming\...\decoder.dll, PE32 12->31 dropped 33 C:\Users\user\AppData\...\swresample-1.dll, PE32 12->33 dropped 35 C:\Users\user\AppData\...\pthreadGC2.dll, PE32 12->35 dropped 37 20 other files (none is malicious) 12->37 dropped 20 msiexec.exe 2 12->20         started        file5 signatures6 process7 dnsIp8 23 conhost.exe 18->23         started        25 timeout.exe 1 18->25         started        39 0.0.1.7 unknown unknown 20->39 process9
Threat name:
Win32.Infostealer.Generic
Status:
Suspicious
First seen:
2021-09-30 15:20:10 UTC
AV detection:
4 of 26 (15.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Enumerates connected drives
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Unpacked files
SH256 hash:
446736e381fa8942f8d32cb4f2ae8fb6a9245fa0e70b7f7298ee7a5cb6fe9f32
MD5 hash:
f8fa0dfbd7f850d4627db88616bac7f5
SHA1 hash:
e44b66c8dccfc544b38f6607ae58e100867df043
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 446736e381fa8942f8d32cb4f2ae8fb6a9245fa0e70b7f7298ee7a5cb6fe9f32

(this sample)

  
Delivery method
Distributed via web download

Comments