MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51fda686a2702205373d05e4fa414c0dd78cec4a639f118cfd42dd598483bf5b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 51fda686a2702205373d05e4fa414c0dd78cec4a639f118cfd42dd598483bf5b
SHA3-384 hash: b9a2a579701032ffcf5a0d55cca23dca92a2622f61b75568e1817234aae039acab95f135870d119a6ea903a61e067109
SHA1 hash: d08565e68cb79a3efcf0ab8d0ad6389f2b948d4c
MD5 hash: 527dfd8be2507b6ff19edd7da120d078
humanhash: lima-bakerloo-nineteen-table
File name:51fda686a2702205373d05e4fa414c0dd78cec4a639f118cfd42dd598483bf5b
Download: download sample
Signature ArkeiStealer
File size:1'470'520 bytes
First seen:2022-05-20 06:54:19 UTC
Last seen:2022-05-20 07:59:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 06a834e3824803366fcfecb5c9777295 (3 x RedLineStealer, 3 x ArkeiStealer, 1 x Gozi)
ssdeep 24576:1nmBAJRuD+teCV7xX6xFb0MS70c5D/DJM3YOmQJKfXkvFV/t78xxv6bGFZCWKK:pAiuyeCN56dQXNMMUzSMvK
TLSH T1FB651210BFD5C535F8A669B17132D644E53BBE8117AB0087A5E863AD42B4FC0AE72373
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon e8d492c8d2b2cccc (1 x ArkeiStealer, 1 x RedLineStealer, 1 x LgoogLoader)
Reporter JAMESWT_WT
Tags:ArkeiStealer exe exxon-com signed

Code Signing Certificate

Organisation:exxon.com
Issuer:GeoTrust RSA CA 2018
Algorithm:sha256WithRSAEncryption
Valid from:2021-12-30T00:00:00Z
Valid to:2022-09-02T23:59:59Z
Serial number: 0a2787fbb4627c91611573e323584113
Intelligence: 18 malware samples on MalwareBazaar are signed with this code signing certificate
MalwareBazaar Blocklist:This certificate is on the MalwareBazaar code signing certificate blocklist (CSCB)
Thumbprint Algorithm:SHA256
Thumbprint: fa1e4addac823be18964381f5da2ba63686dff30c05833f0ece8bef2101b37e1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
270
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Pa$$w0rd_is_1234__Files--G6.rar
Verdict:
Malicious activity
Analysis date:
2022-05-16 17:37:10 UTC
Tags:
loader opendir evasion trojan rat redline stealer arkei vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
Launching a process
Сreating synchronization primitives
DNS request
Sending an HTTP GET request
Creating a file
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CallSleep
SystemUptime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 630802 Sample: ZY6VsKqGcj Startdate: 20/05/2022 Architecture: WINDOWS Score: 100 38 Snort IDS alert for network traffic 2->38 40 Malicious sample detected (through community Yara rule) 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 4 other signatures 2->44 8 ZY6VsKqGcj.exe 2->8         started        process3 signatures4 46 Writes to foreign memory regions 8->46 48 Allocates memory in foreign processes 8->48 50 Injects a PE file into a foreign processes 8->50 11 InstallUtil.exe 147 8->11         started        process5 dnsIp6 32 95.217.244.73, 49798, 80 HETZNER-ASDE Germany 11->32 34 t.me 149.154.167.99, 443, 49797 TELEGRAMRU United Kingdom 11->34 36 192.168.2.1 unknown unknown 11->36 24 C:\ProgramData\vcruntime140.dll, PE32 11->24 dropped 26 C:\ProgramData\softokn3.dll, PE32 11->26 dropped 28 C:\ProgramData\nss3.dll, PE32 11->28 dropped 30 3 other files (none is malicious) 11->30 dropped 52 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->52 54 Tries to steal Mail credentials (via file / registry access) 11->54 56 Tries to harvest and steal browser information (history, passwords, etc) 11->56 58 Tries to steal Crypto Currency Wallets 11->58 16 cmd.exe 1 11->16         started        file7 signatures8 process9 process10 18 taskkill.exe 1 16->18         started        20 conhost.exe 16->20         started        22 timeout.exe 1 16->22         started       
Threat name:
Win32.Infostealer.Bandra
Status:
Malicious
First seen:
2022-05-17 00:20:59 UTC
File Type:
PE (Exe)
Extracted files:
11
AV detection:
19 of 41 (46.34%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:1326 spyware stealer suricata
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Vidar Stealer
Vidar
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
Malware Config
C2 Extraction:
https://t.me/netflixaccsfree
https://mastodon.social/@ronxik12
Unpacked files
SH256 hash:
0214c027dd63832ca68d205337b02eb3b3180e1f06064b22abfbfb4cd91a4733
MD5 hash:
ea6af667f03464a67e718ed30ca9967b
SHA1 hash:
ea3016fff2a950bf18c03e212c8e08795f1be874
SH256 hash:
0b41616b88377c4b4b8667ff48d6b2d80d9632e0b8f3824bd431f42740afd8c6
MD5 hash:
f3d8a706993b3a3d8cf8158f0bcca4d9
SHA1 hash:
2c7decdf4f83491d8bcc2a8186283e1d1268485a
SH256 hash:
3d2feb75464f3da875cf0650712d2b72d24f94a00c8883b93c2de461a1f28182
MD5 hash:
34eb114661ee506e5ad227fd49c8f5aa
SHA1 hash:
cf2d37d2eaf67a631021f5764a5254ca3b233511
SH256 hash:
51fda686a2702205373d05e4fa414c0dd78cec4a639f118cfd42dd598483bf5b
MD5 hash:
527dfd8be2507b6ff19edd7da120d078
SHA1 hash:
d08565e68cb79a3efcf0ab8d0ad6389f2b948d4c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments