MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 49bc7d63d4e82e6d645b37f79c7e689fbe0f8313152376b14e68d570c99afb82. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 49bc7d63d4e82e6d645b37f79c7e689fbe0f8313152376b14e68d570c99afb82
SHA3-384 hash: aedfd6fe7e7106e0f331f4f066806ee4007b19e5c7ab73263078998feab279183eca833bd2497a9415b78e0e4fd1ebee
SHA1 hash: 40e376a63ff6866eadf5423b5b318fcc25758ffd
MD5 hash: 54703a1521ec4d0d257fd72bcb318971
humanhash: mountain-vegan-spaghetti-oven
File name:setup_x86_x64_install.exe
Download: download sample
Signature ArkeiStealer
File size:12'143'659 bytes
First seen:2021-11-26 20:40:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JY+VXBp3W7jPP73yMItJQFW4f8a15r3LUdg6XQo0HMYfdcWM/7MnkYtpNYMbz5q9:JY+V7sjPDCxJQFkaDr3LcxQo0qjDMntq
Threatray 754 similar samples on MalwareBazaar
TLSH T109C63362EAEE7627D6D70C34244A27A3CF3F7E62850193330E76769139A1E1475EC9B0
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter Anonymous
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
182
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-11-26 20:39:23 UTC
Tags:
trojan rat redline loader evasion stealer vidar opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
DNS request
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Backstage Stealer RedLine Socelars
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contain functionality to detect virtual machines
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to infect the boot sector
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Backstage Stealer
Yara detected RedLine Stealer
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 529463 Sample: setup_x86_x64_install.exe Startdate: 26/11/2021 Architecture: WINDOWS Score: 100 71 212.193.30.45 SPD-NETTR Russian Federation 2->71 73 195.123.220.246 ITLDC-NLUA Bulgaria 2->73 75 3 other IPs or domains 2->75 97 Antivirus detection for dropped file 2->97 99 Antivirus / Scanner detection for submitted sample 2->99 101 Multi AV Scanner detection for dropped file 2->101 103 17 other signatures 2->103 10 setup_x86_x64_install.exe 10 2->10         started        13 svchost.exe 10 1 2->13         started        17 svchost.exe 2->17         started        19 5 other processes 2->19 signatures3 process4 dnsIp5 61 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->61 dropped 21 setup_installer.exe 24 10->21         started        87 8.8.8.8 GOOGLEUS United States 13->87 89 23.213.168.66 AKAMAI-ASUS United States 13->89 91 2 other IPs or domains 13->91 127 Sets debug register (to hijack the execution of another thread) 13->127 129 Modifies the context of a thread in another process (thread injection) 13->129 131 Changes security center settings (notifications, updates, antivirus, firewall) 17->131 file6 signatures7 process8 file9 53 C:\Users\user\AppData\...\setup_install.exe, PE32 21->53 dropped 55 C:\Users\user\...\Fri20dd1f5f1511478e4.exe, PE32 21->55 dropped 57 C:\Users\user\...\Fri20bc562fa6acd.exe, PE32+ 21->57 dropped 59 19 other files (12 malicious) 21->59 dropped 24 setup_install.exe 1 21->24         started        process10 signatures11 123 Adds a directory exclusion to Windows Defender 24->123 125 Disables Windows Defender (via service or powershell) 24->125 27 cmd.exe 24->27         started        29 cmd.exe 24->29         started        31 cmd.exe 24->31         started        33 8 other processes 24->33 process12 signatures13 36 Fri20a252fe0d.exe 27->36         started        39 Fri2002bea00b158d.exe 29->39         started        41 Fri2064de6352.exe 31->41         started        93 Adds a directory exclusion to Windows Defender 33->93 95 Disables Windows Defender (via service or powershell) 33->95 45 Fri20405c77f8562ea6.exe 33->45         started        47 Fri20bc562fa6acd.exe 33->47         started        49 Fri2050c5d6de57ca396.exe 33->49         started        51 3 other processes 33->51 process14 dnsIp15 105 Detected unpacking (changes PE section rights) 36->105 107 Tries to detect sandboxes and other dynamic analysis tools (window names) 36->107 109 Machine Learning detection for dropped file 36->109 121 5 other signatures 36->121 111 Antivirus detection for dropped file 39->111 113 Multi AV Scanner detection for dropped file 39->113 115 Sample uses process hollowing technique 39->115 77 104.21.50.241 CLOUDFLARENETUS United States 41->77 63 C:\Users\user\AppData\Roaming\4680459.exe, PE32 41->63 dropped 65 C:\Users\user\AppData\Roaming\4590205.exe, PE32 41->65 dropped 67 C:\Users\user\AppData\Roaming\4289424.exe, MS-DOS 41->67 dropped 69 C:\Users\user\...\Fri20405c77f8562ea6.tmp, PE32 45->69 dropped 117 Obfuscated command line found 45->117 79 208.95.112.1 TUT-ASUS United States 47->79 81 88.218.95.235 ENZUINC-US Netherlands 47->81 119 Tries to harvest and steal browser information (history, passwords, etc) 47->119 83 5.9.162.45 HETZNER-ASDE Germany 51->83 85 149.28.253.196 AS-CHOOPAUS United States 51->85 file16 signatures17
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-11-26 20:41:47 UTC
File Type:
PE (Exe)
Extracted files:
271
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:933 aspackv2 backdoor infostealer stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.ecgbg.com/
http://membro.at/upload/
http://jeevanpunetha.com/upload/
http://misipu.cn/upload/
http://zavodooo.ru/upload/
http://targiko.ru/upload/
http://vues3d.com/upload/
https://mstdn.social/@anapa
https://mastodon.social/@mniami
Unpacked files
SH256 hash:
152e12547ca933b021d0f1c04474b72b74e50983548d965c2eeac398c0a84d6c
MD5 hash:
d98fccb15197651fe8f2f823acf2c85c
SHA1 hash:
5a79a53acb83e5b330ca05798e3639c01e29e03e
SH256 hash:
106829fc4a89cf732d2a730e5ddcb9226ed1d3655829d86f4af5372c8a93d6f4
MD5 hash:
48212e58c4685996a24472832e51f8c2
SHA1 hash:
4aa62945126df2c31455b5d575946575286c9034
SH256 hash:
d04d08dcc992204103589c66cbd629caca7c0b5a41d248a7140b4c19df21256b
MD5 hash:
e6e1e7e67602be64b67dabc0d46b6fcf
SHA1 hash:
5bcf3d7f2ebdb1690bb7b0592e2776076e7b4d47
SH256 hash:
c041b49989f2654558e2baf33aee4c2a5c52b9bb99f947ad3466df4f263806c0
MD5 hash:
cbc0ea99f0eb922755c8d89c4065213d
SHA1 hash:
ea526a040c9d89014ee77740fd3c201462839831
SH256 hash:
9d2c5e65205e9fafe9ea563533aec16d870fb44196dd83ba3170dc70a5f1da01
MD5 hash:
c58dc3f5e62fb1f3fe788d0ab298e6a4
SHA1 hash:
a924f54c224fcf15658d4e8e6e15a815a12a86ea
SH256 hash:
376bf69f01fe65802f1ec35b8715067687c4bd47937154fc4c3903b06fe89a92
MD5 hash:
feea5b4bc6a46188e7998b53b668d6fe
SHA1 hash:
ff73a76d88ba96baba23acf669ab2fb61e541916
SH256 hash:
9446114690f9df9265728dd795c2166a5c538a072bc94983e66c9f532145df79
MD5 hash:
5d36287f497ff64ba552ba53b5feaa61
SHA1 hash:
1398e94d03f57b8f46860500acb00be3cd96d8aa
SH256 hash:
f1c467e091505308b0a1d06214efdb8040b75625205c628b301f684ff4f72683
MD5 hash:
cf331e904d5e3484e697503d9dd56aab
SHA1 hash:
c36eb706494218d29802047e7217bf9e9aa732fb
SH256 hash:
fd3467342ea89580344fa1096dd44b9a11dee3310298ba19a9225f56279a7ea4
MD5 hash:
9b9baf68a21a33248994efc9f48d644e
SHA1 hash:
06b714302251537dada4038a424b7022ecb3b7f7
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
4feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
MD5 hash:
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1 hash:
f61d31d176ba67cfff4f0cab04b4b2d19df91684
SH256 hash:
4f7cd4d1f2a4abc20291795c4a1bdec48139c4245918d67fee524327f54c3537
MD5 hash:
bef9634b837a452ad03a652ba1320c6d
SHA1 hash:
fb2e2e2d6ef638839f44e870d47d3a4822e9109d
SH256 hash:
1a5f725135de24b7ed88f91fb548fe3ec18e88f850bf4393d591a3851cbbc0a9
MD5 hash:
77e2424c4d80c4b9fe0e591d4ca886dd
SHA1 hash:
e94223a4849dda4d40b5e6df8b42d9c91b91247a
SH256 hash:
a4b550537b59b6880b3b9956f832ce08a2156d7c4b503b0e85df2711b158fa56
MD5 hash:
e17608677584e10f7fd28c95ddf2f4fe
SHA1 hash:
e2461e15cadb671ccd3f7fc51406669449349963
SH256 hash:
ee70bfed1fe5830422ae563ff1395c1e3a3928089f66e3d511a6baeb89dc9df9
MD5 hash:
d32e0f3b0267f0e6912bd31d675e2322
SHA1 hash:
d8a681a4b6f22c92914f6ec7f9958aa6fc9240cc
SH256 hash:
65be595ecda12bd961380d1061d7f887a367dfbbcbf58a34a2bfb13b5d69a0ea
MD5 hash:
b2e9b739ea952656ca2579e827792c0f
SHA1 hash:
c236c4e3629d3e5a2ce810ebe06fbf47b2e0e05b
SH256 hash:
ca299eb5fa129b16ad9bd28e82bdfc2487e035527cf3c1ac524da7788a3a976a
MD5 hash:
f757878fe285610c879dc82e06d8c507
SHA1 hash:
c18effdfc959d901524299fadf5fac0474074e55
SH256 hash:
734f5d593286866d4abef9061e6f0b6a78a7f70f03f32baa6af4aec477565c37
MD5 hash:
ddb0102d9de243f1d988f833a8cfe173
SHA1 hash:
4a0f44a78b79ca304a14111e981294cf7bf6600a
SH256 hash:
79c88eeb1bddab9be047f3cc669b2be83f2b7bd12ff951bc6d13ed369891d3dd
MD5 hash:
78563a1323a4187dc74a88019230f2d0
SHA1 hash:
42a56944d9a2caa6b6ff8af6bc83fe5c8abbeb17
SH256 hash:
a780dc4857b91ef706fa4109673480bb22029f3316837736d32c69246e061e12
MD5 hash:
ff2b2de49a63abca6d1a4f6e16c4255b
SHA1 hash:
21ecc875382f01eb8f4079167e7862732ab489d4
SH256 hash:
c1d4c6f29eec2d2a0960988875174f304f74840b1e98e96d4b7cb1926446df8c
MD5 hash:
37336f90b8d298f522cfe141680de270
SHA1 hash:
1e19a576a66a88943456a86bc96165aa8d965300
SH256 hash:
b81bad27dea53d48c07d74e814cff8514627bf44a300ffa5d65398e0f9269020
MD5 hash:
6b60de8eb1ad8acde4a76b70beebb9f3
SHA1 hash:
1b583619fdbbf3bb13911e163cad0ae566f1cbbc
SH256 hash:
52df011fbadf5367245fa34eccbf8ad30c195d495f91c39ab2e06c3bb47d2e98
MD5 hash:
08d4d241da8671ddb44196c725c0c9d6
SHA1 hash:
0627fe31ab858e4aaa53b83067a8c5217b447fb5
SH256 hash:
070d779d81440f7ab87f792d2345f4f6703348a5cd49a3d65cee3c5178266746
MD5 hash:
8720bf9043334770474de705c0ea17ee
SHA1 hash:
67e215fe6a91a541817237b5d30d81da0f2f513d
SH256 hash:
8c5bc165ed4be6f6c1f3a0c0d47630af73c3b96c01a80dd559cd37604fd988bf
MD5 hash:
cc526d59dc9123a12490d0379c3744a3
SHA1 hash:
2d058b8d7b72992c2e6e0981c4fa868d6c7aaec4
SH256 hash:
93c4cba30e4e919db036ca03b25885094ff34caf6a52125dc5647c16c454e700
MD5 hash:
f0380d884cef856b846e2128714e63be
SHA1 hash:
a51466452c7ad1b604335cfcf00f6547ba326dfb
SH256 hash:
1b5bb44a02a88ef50f2b007ee37381fde140ba552ede05995ff2ace957281d68
MD5 hash:
38b80d276e4086652f72a8c996df1ccc
SHA1 hash:
2c66cb310a25023d4a805e795375e50dc18e4ba0
SH256 hash:
6a1002042b4b49cabce083b0cafd5686f2e1e659b211e9a4cdc014462b20da17
MD5 hash:
29345bade3df3e2860c4fca2c7ac3181
SHA1 hash:
abea1eb155dd725760f4b9863452ce05ac255c4c
SH256 hash:
c3154270a81adc6d26ab82aeac7001ad669f5415e434d5c6d6d36e3fa5db32bf
MD5 hash:
ffe8831b0f36b9781abe671bea03fd19
SHA1 hash:
1674a5c2dc558d056ea0bf67bc33049c4b2ec798
SH256 hash:
150ca23693f1e97049923f8954df4909bf8da250b504d41766209d4e306c2ca7
MD5 hash:
2ad67b27f8ee1eb228ac1e8574866554
SHA1 hash:
567c9c8c1b4e9006c11fe14572e8be472a42c4f8
SH256 hash:
16767dbc99ca59ec61d502a875f6a768b0f1b20fdb30af96e1164c84584efdf7
MD5 hash:
022a0e067a1dd6e064572d4ad20afdd5
SHA1 hash:
9fa2e16ac53dd4adb62fe44b857ae9376edde5ea
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
713d22b1ede9f6327883a193105f76056ff9507002d24b1ba31da396b0ca6a22
MD5 hash:
2ddfb61f5315f92ae0a5d99c072101fe
SHA1 hash:
de8f9109afb1af318892a0b1cf24b3d05e2e6c64
SH256 hash:
0e71583722c85e709094e02fdcd9b6ca21890aadfeddeb01c628ad1a5ff0fcae
MD5 hash:
a18cd332cb6442c297dbfdefec05185f
SHA1 hash:
3bdf3ee9cbd68059c978f1694902338902ce8440
SH256 hash:
49bc7d63d4e82e6d645b37f79c7e689fbe0f8313152376b14e68d570c99afb82
MD5 hash:
54703a1521ec4d0d257fd72bcb318971
SHA1 hash:
40e376a63ff6866eadf5423b5b318fcc25758ffd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments