MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 739ea02b27b4ddb79ba40418fe09fbdd723b73ad8dabf5f2706f02e1248197dd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 6 File information Comments

SHA256 hash: 739ea02b27b4ddb79ba40418fe09fbdd723b73ad8dabf5f2706f02e1248197dd
SHA3-384 hash: 22313668b53c65622f7945ce8d5a30e1032127622a862ae26b3eecbf0ad007763c24877a58f64f58065b7099cce5fc70
SHA1 hash: c7db0e9dfa1f4b4bf54820df1a5c8ab2cabf3042
MD5 hash: fb1ad08f652a40059277a4e995ea5b66
humanhash: november-west-queen-beer
File name:fb1ad08f652a40059277a4e995ea5b66.exe
Download: download sample
Signature ArkeiStealer
File size:1'286'300 bytes
First seen:2021-06-14 08:20:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 24576:pAT8QE+ka/2i+llsSphe8VfD1Gk8tPh9o2Zc5KdekBOIaLiu6XCorYz:pAI+NYl5NhDWh9VZvYZqCore
TLSH EB552339A681867BD1120532484FD3B2B53BBA059B7C59CFB7DD0E6D8C372061AB42DB
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fb1ad08f652a40059277a4e995ea5b66.exe
Verdict:
No threats detected
Analysis date:
2021-06-14 08:27:10 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the Program Files subdirectories
Deleting a recently created file
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Replacing files
Creating a file in the Windows subdirectories
DNS request
Sending a custom TCP request
Running batch commands
Sending an HTTP GET request
Moving a file to the Program Files subdirectory
Creating a file
Sending a UDP request
Searching for the window
Unauthorized injection to a recently created process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses regedit.exe to modify the Windows registry
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 434047 Sample: BB12Wh8OGQ.exe Startdate: 14/06/2021 Architecture: WINDOWS Score: 100 107 Found malware configuration 2->107 109 Antivirus detection for URL or domain 2->109 111 Antivirus detection for dropped file 2->111 113 7 other signatures 2->113 8 BB12Wh8OGQ.exe 18 13 2->8         started        11 iexplore.exe 1 54 2->11         started        13 explorer.exe 2->13         started        process3 file4 79 C:\Program Files (x86)\...\Toner-Recover.exe, PE32 8->79 dropped 81 C:\Program Files (x86)\VR\...\Second.exe, PE32 8->81 dropped 83 C:\Program Files (x86)\VR\...\RunWW.exe, PE32 8->83 dropped 85 C:\Program Files (x86)\VR\...\Uninstall.exe, PE32 8->85 dropped 15 RunWW.exe 86 8->15         started        20 Second.exe 2 8->20         started        22 Toner-Recover.exe 16 14 8->22         started        24 iexplore.exe 38 11->24         started        26 iexplore.exe 11->26         started        28 iexplore.exe 13->28         started        process5 dnsIp6 95 159.69.20.131, 49747, 80 HETZNER-ASDE Germany 15->95 97 bandakere.tumblr.com 74.114.154.18, 443, 49743 AUTOMATTICUS Canada 15->97 57 C:\Users\user\AppData\...\softokn3[1].dll, PE32 15->57 dropped 59 C:\Users\user\AppData\...\freebl3[1].dll, PE32 15->59 dropped 61 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 15->61 dropped 69 9 other files (none is malicious) 15->69 dropped 101 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->101 103 Tries to harvest and steal browser information (history, passwords, etc) 15->103 105 Tries to steal Crypto Currency Wallets 15->105 30 cmd.exe 15->30         started        63 C:\Users\user\AppData\Local\...\Second.tmp, PE32 20->63 dropped 32 Second.tmp 20 19 20->32         started        65 C:\Program Files (x86)\...\Uninstall.exe, PE32 22->65 dropped 67 C:\Program Files (x86)\...\Toner-Recover.exe, PE32 22->67 dropped 37 cmd.exe 22->37         started        39 Toner-Recover.exe 22->39         started        99 iplogger.org 88.99.66.31, 443, 49731, 49732 HETZNER-ASDE Germany 24->99 41 iexplore.exe 28->41         started        file7 signatures8 process9 dnsIp10 43 conhost.exe 30->43         started        45 taskkill.exe 30->45         started        47 timeout.exe 30->47         started        87 download-serv-124473.xyz 172.67.163.69, 49728, 49729, 80 CLOUDFLARENETUS United States 32->87 89 ipinfo.io 34.117.59.81, 443, 49725, 49726 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 32->89 93 2 other IPs or domains 32->93 71 C:\Users\user\AppData\...\itdownload.dll, PE32 32->71 dropped 73 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 32->73 dropped 75 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 32->75 dropped 77 C:\Program Files (x86)\...\is-VB9P9.tmp, PE32 32->77 dropped 115 Creates HTML files with .exe extension (expired dropper behavior) 32->115 117 Performs DNS queries to domains with low reputation 32->117 119 Uses regedit.exe to modify the Windows registry 37->119 49 conhost.exe 37->49         started        51 explorer.exe 37->51         started        53 regedit.exe 37->53         started        55 regedit.exe 37->55         started        91 iplogger.org 41->91 file11 signatures12 process13
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-06-14 06:37:37 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar discovery evasion spyware stealer trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Modifies system certificate store
NTFS ADS
Runs .reg file with regedit
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Vidar
Unpacked files
SH256 hash:
ec32b38e5ad5c285c1d6d8237341a99772709e8e4ea23db953d63ab8f078379c
MD5 hash:
ccf4a60623b784b084855d0468d76eab
SHA1 hash:
9419cc65a1bb70e8780f6da7cedd169eb333db88
SH256 hash:
b3cb6adcad3351bb46ef8a59db88161777663b85ccfdffc2424ee5754a1081de
MD5 hash:
a155f0b2a743c0a975f3f524ff22d31f
SHA1 hash:
4c485b422773f6e569ddaf57fb034d26bb5d9036
SH256 hash:
739ea02b27b4ddb79ba40418fe09fbdd723b73ad8dabf5f2706f02e1248197dd
MD5 hash:
fb1ad08f652a40059277a4e995ea5b66
SHA1 hash:
c7db0e9dfa1f4b4bf54820df1a5c8ab2cabf3042
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 739ea02b27b4ddb79ba40418fe09fbdd723b73ad8dabf5f2706f02e1248197dd

(this sample)

  
Delivery method
Distributed via web download

Comments