MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68516622ba1e5d57863f74ace36e02e400b92640281507f3c89ecbc8dacbd9fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 1 File information Comments

SHA256 hash: 68516622ba1e5d57863f74ace36e02e400b92640281507f3c89ecbc8dacbd9fa
SHA3-384 hash: 0321f1de1fb3d82125d9e246a69782225bc2e1552d4d7776691550c28e9a232867ae602bd5781250c90484493b1f6a04
SHA1 hash: 4ed4e0b75e5b53451fbe623f744a989afb0f90a2
MD5 hash: 31ba1ca1200a7ad0b1f209937e42b009
humanhash: stairway-artist-black-island
File name:68516622ba1e5d57863f74ace36e02e400b92640281507f3c89ecbc8dacbd9fa
Download: download sample
Signature ArkeiStealer
File size:726'016 bytes
First seen:2020-07-21 13:17:59 UTC
Last seen:2020-07-21 14:04:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash cd03b3f777f33482b7b7ebd2fdd10cfc (1 x ArkeiStealer)
ssdeep 12288:Qgdu+f0fZngRpjyrpWwa8NJvQ1bOAFuMNUiHHL3Xe8aZxYTlSHxBZmj:Q4u+f0Cnjy4waYhQJA4UinLdqYwPZI
TLSH BCF412D13C81C6B7E4001677D869CDB12929B4644C2A9BE77F860BB40F3A6C2EF27794
Reporter JAMESWT_WT
Tags:ArkeiStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
77
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a file
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Creating a process from a recently created file
Connection attempt
Sending an HTTP GET request
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun with Startup directory
Sending an HTTP GET request to an infection source
Changing the hosts file
Result
Threat name:
Djvu Vidar
Detection:
malicious
Classification:
rans.phis.troj.adwa.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 248935 Sample: T6Dqe5uEKE Startdate: 22/07/2020 Architecture: WINDOWS Score: 100 89 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->89 91 Multi AV Scanner detection for domain / URL 2->91 93 Multi AV Scanner detection for submitted file 2->93 95 8 other signatures 2->95 10 T6Dqe5uEKE.exe 1 17 2->10         started        15 T6Dqe5uEKE.exe 13 2->15         started        17 T6Dqe5uEKE.exe 2->17         started        19 2 other processes 2->19 process3 dnsIp4 83 api.2ip.ua 77.123.139.189, 443, 49731, 49732 VOLIA-ASUA Ukraine 10->83 65 C:\Users\user\AppData\...\T6Dqe5uEKE.exe, PE32 10->65 dropped 67 C:\Users\...\T6Dqe5uEKE.exe:Zone.Identifier, ASCII 10->67 dropped 101 Detected unpacking (changes PE section rights) 10->101 103 Detected unpacking (overwrites its own PE header) 10->103 105 Writes many files with high entropy 10->105 21 T6Dqe5uEKE.exe 1 28 10->21         started        26 icacls.exe 10->26         started        107 Multi AV Scanner detection for dropped file 15->107 109 Machine Learning detection for dropped file 15->109 file5 signatures6 process7 dnsIp8 79 cjto.top 31.184.254.16, 49733, 49734, 49736 SELECTELRU Russian Federation 21->79 81 api.2ip.ua 21->81 55 C:\Users\user\AppData\...\updatewin2.exe, PE32 21->55 dropped 57 C:\Users\user\AppData\...\updatewin1.exe, PE32 21->57 dropped 59 C:\Users\user\AppData\Local\...\5.exe, PE32 21->59 dropped 61 480 other files (471 malicious) 21->61 dropped 97 Modifies existing user documents (likely ransomware behavior) 21->97 28 5.exe 21->28         started        33 updatewin2.exe 21->33         started        35 updatewin1.exe 2 21->35         started        file9 signatures10 process11 dnsIp12 85 interludeeurope.com 179.43.156.230, 49741, 80 PLI-ASCH Panama 28->85 87 ip-api.com 208.95.112.1, 49743, 80 TUT-ASUS United States 28->87 69 C:\Users\user\AppData\...\softokn3[1].dll, PE32 28->69 dropped 71 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 28->71 dropped 73 C:\Users\user\AppData\...\freebl3[1].dll, PE32 28->73 dropped 77 9 other files (none is malicious) 28->77 dropped 111 Detected unpacking (changes PE section rights) 28->111 113 Detected unpacking (overwrites its own PE header) 28->113 115 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 28->115 121 3 other signatures 28->121 37 cmd.exe 28->37         started        75 C:\Windows\System32\drivers\etc\hosts, ASCII 33->75 dropped 117 Mutes Antivirus updates and installments via hosts file black listing 33->117 119 Modifies the hosts file 33->119 39 updatewin1.exe 35->39         started        file13 signatures14 process15 file16 43 conhost.exe 37->43         started        45 taskkill.exe 37->45         started        63 C:\Users\user\AppData\Local\script.ps1, ASCII 39->63 dropped 99 Suspicious powershell command line found 39->99 47 powershell.exe 39->47         started        49 powershell.exe 39->49         started        signatures17 process18 process19 51 conhost.exe 47->51         started        53 conhost.exe 49->53         started       
Threat name:
Win32.Trojan.DanaBot
Status:
Malicious
First seen:
2020-07-21 02:36:41 UTC
File Type:
PE (Exe)
Extracted files:
22
AV detection:
44 of 48 (91.67%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
Score:
  10/10
Tags:
ransomware family:djvu persistence spyware discovery evasion
Behaviour
Suspicious use of AdjustPrivilegeToken
Checks processor information in registry
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks installed software on the system
JavaScript code in executable
Looks up external IP address via web service
Adds Run key to start application
Reads user/profile data of local email clients
Loads dropped DLL
Reads user/profile data of web browsers
Modifies file permissions
Executes dropped EXE
Disables Task Manager via registry modification
Drops file in Drivers directory
Djvu Ransomware
Deletes Windows Defender Definitions
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_stop_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments