MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 54c3132ced005758148cd36e63a125bfb4deac0378d3ed9b692bb0b61233785d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ArkeiStealer
Vendor detections: 16
| SHA256 hash: | 54c3132ced005758148cd36e63a125bfb4deac0378d3ed9b692bb0b61233785d |
|---|---|
| SHA3-384 hash: | 26fa153b76a4ee50cd30f0c6d9fa35718188e9e21cf29892bc5eee345ca591e8ae51f53c124e03e1d1727373437a6239 |
| SHA1 hash: | 540f8afd315758810f62c415a9c9a86658b0a912 |
| MD5 hash: | 83c47ef5276c93ec4a265eab431052ee |
| humanhash: | florida-louisiana-blue-equal |
| File name: | file.exe |
| Download: | download sample |
| Signature | ArkeiStealer |
| File size: | 334'336 bytes |
| First seen: | 2023-05-31 02:03:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b16c3db38ebd1039deaa7b416b1dd4fc (1 x ArkeiStealer, 1 x GCleaner, 1 x Rhadamanthys) |
| ssdeep | 6144:5ZK2IHjLcW91gEESj+KgL7YlPXPGWGb65:yjLcYgEESj+KgXYlP/Gi |
| Threatray | 9 similar samples on MalwareBazaar |
| TLSH | T13464D00352E0FC5CE7674B31BE2ED6E87A1EF5D14E69675A32177A2F08701A2C2A3711 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0030e09010101000 (1 x ArkeiStealer, 1 x Stealc) |
| Reporter | |
| Tags: | ArkeiStealer exe |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://23.88.46.113:80
https://steamcommunity.com/profiles/76561199510444991
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | has_telegram_urls |
|---|---|
| Author: | Aaron DeVera<aaron@backchannel.re> |
| Description: | Detects Telegram URLs |
| Rule name: | Telegram_Links |
|---|
| Rule name: | Vidar |
|---|---|
| Author: | kevoreilly,rony |
| Description: | Vidar Payload |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.