MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4a39b341e2d5fd5085d7ca2ee6a11d144a8dbc559d7e5c371947d9bfa98e87f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 7


Intelligence 7 IOCs 1 YARA File information Comments

SHA256 hash: 4a39b341e2d5fd5085d7ca2ee6a11d144a8dbc559d7e5c371947d9bfa98e87f2
SHA3-384 hash: 36bb40f1c1668eb80ad6e4a51e3579ed79dfcbbb329455df4151c98ee5982de063e47801d13ef62ff79097622fec060d
SHA1 hash: 0d56c63f4afd00d7bd67fe561a2b7de0a08ff365
MD5 hash: a282da0cf8b4a35a1fec2a5751682acf
humanhash: bulldog-wisconsin-oranges-jig
File name:4a39b341e2d5fd5085d7ca2ee6a11d144a8dbc559d7e5c371947d9bfa98e87f2
Download: download sample
Signature ArkeiStealer
File size:2'949'344 bytes
First seen:2021-03-29 07:08:34 UTC
Last seen:2021-03-29 07:48:23 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ba4cc0afb12afe0a3f885ae6696404ed (1 x ArkeiStealer)
ssdeep 49152:VgprPO37fzH4A6hanqNmZBb9TcAY8bsTLtWfWT:WprPO37fzH4A6h0PtcAYbmW
Threatray 584 similar samples on MalwareBazaar
TLSH AED59D29B1B34CB6F36A5E3658164160673EFD843E28ACD635D6FA3E0BF518335261C2
Reporter JAMESWT_WT
Tags:ArkeiStealer LTD SERVICES LIMITED signed

Code Signing Certificate

Organisation:LTD SERVICES LIMITED
Issuer:Sectigo RSA Code Signing CA
Algorithm:sha256WithRSAEncryption
Valid from:2021-03-18T00:00:00Z
Valid to:2022-03-18T23:59:59Z
Serial number: 7d36cbb64bc9add17ba71737d3ecceca
Intelligence: 9 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: 05be3171ca7272803d139ca13b16c24a3dd22917b1b8d6d0fd5401e63a79dd27
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://104.244.76.207/ https://threatfox.abuse.ch/ioc/5736/

Intelligence


File Origin
# of uploads :
2
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Main-Installer.exe
Verdict:
Malicious activity
Analysis date:
2021-03-28 23:17:08 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Sending a custom TCP request
DNS request
Sending a UDP request
Sending an HTTP GET request to an infection source
Sending an HTTP POST request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Detected unpacking (changes PE section rights)
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Tries to detect virtualization through RDTSC time measurements
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-03-29 07:09:07 UTC
File Type:
PE (Exe)
Extracted files:
45
AV detection:
16 of 48 (33.33%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence spyware stealer upx
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
Unpacked files
SH256 hash:
7b0b8db231d411d10f45ed54779fcfa8f3e442e04a31733ee2598b0dd3f63229
MD5 hash:
e769e747bb0fb0c1893e27af747094df
SHA1 hash:
af49f0054f201ba4a4b2d010d661e3d1f78e2a72
SH256 hash:
4a39b341e2d5fd5085d7ca2ee6a11d144a8dbc559d7e5c371947d9bfa98e87f2
MD5 hash:
a282da0cf8b4a35a1fec2a5751682acf
SHA1 hash:
0d56c63f4afd00d7bd67fe561a2b7de0a08ff365
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments