MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5760219348f8e2b162a4ed4c764d9d8c7333b2af9e97e1d437ff21a3da0e1061. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 5760219348f8e2b162a4ed4c764d9d8c7333b2af9e97e1d437ff21a3da0e1061
SHA3-384 hash: 4a926c2601ee7d2ea41e90cf83310e9bb19106bbca8b620130f6108443ad8d671ef0170b868ca8882ba01979d5314b4e
SHA1 hash: 1eebdb3019ca6855cb9701608d3d2221aa5e2f91
MD5 hash: 75a5305d1c91f809b95d87136a457f83
humanhash: iowa-fourteen-idaho-violet
File name:75a5305d1c91f809b95d87136a457f83.exe
Download: download sample
Signature ArkeiStealer
File size:307'712 bytes
First seen:2022-03-23 20:01:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8f242c9c63ca6345b847b0a3155096ac (5 x Smoke Loader, 5 x Stop, 3 x ArkeiStealer)
ssdeep 6144:inB2j3smRj+uQ9qsfJzim6hlwLLC8uro/5:i0j3smRj+N/fJyh2HN
Threatray 370 similar samples on MalwareBazaar
TLSH T15564BF10BBA0C035E1B752F889B993ACB92E79B15B2494CB63C51BEE57356E0EC31347
File icon (PE):PE icon
dhash icon bedacaaecee6baa6 (2 x ArkeiStealer, 1 x RedLineStealer, 1 x Amadey)
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
181
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Oski Stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Raccrypt
Status:
Malicious
First seen:
2022-03-23 08:41:35 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:arkei botnet:default stealer
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Arkei
Malware Config
C2 Extraction:
http://cheapa.link/4874185.php
Unpacked files
SH256 hash:
10879498aaf173229244d08e53cb3d31586061b7d97fb0a6ab1fbac7e74acb1a
MD5 hash:
bc990388a6c4d86a3be84dc3ad944ba4
SHA1 hash:
66c3686c7585771d6632e169b153a7559e986d66
SH256 hash:
5760219348f8e2b162a4ed4c764d9d8c7333b2af9e97e1d437ff21a3da0e1061
MD5 hash:
75a5305d1c91f809b95d87136a457f83
SHA1 hash:
1eebdb3019ca6855cb9701608d3d2221aa5e2f91
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 5760219348f8e2b162a4ed4c764d9d8c7333b2af9e97e1d437ff21a3da0e1061

(this sample)

  
Delivery method
Distributed via web download

Comments