MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 766a6e0ae0c481363de94581770216bec512668c7c6bafd3910fbc85e47823d7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 766a6e0ae0c481363de94581770216bec512668c7c6bafd3910fbc85e47823d7
SHA3-384 hash: f0af7dc8b7ed27fe31791414eae96faf7d86db7fca944aa926eb9d2d66af86ac8414449db729cadad327eedbb906e1ad
SHA1 hash: 265922555ff8e4fe52ffe628da53ea22eaa19b49
MD5 hash: 8ad995ded72bfb869422e6abb35f38e0
humanhash: venus-sodium-green-south
File name:8ad995ded72bfb869422e6abb35f38e0.exe
Download: download sample
Signature ArkeiStealer
File size:312'832 bytes
First seen:2022-01-12 09:59:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a3d2fbd079c316ec1ec8d885346383d7 (1 x RedLineStealer, 1 x Smoke Loader, 1 x DanaBot)
ssdeep 3072:YUxrkYDGbYcpsi+Nw7waU5tH5jyNZvM+TnEFGuUXcNXC49EPWrxpzbgqru:YUxoYLcrrwak1yfvTTpkSDuzbgwu
TLSH T17864BF31369CC472C49355318C61CAB09B2AF9326A61A9873754177E5F30ECCDAF639E
File icon (PE):PE icon
dhash icon fcfcd4d4d4d4d8c8 (18 x RedLineStealer, 6 x ArkeiStealer, 5 x RaccoonStealer)
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
235
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8ad995ded72bfb869422e6abb35f38e0.exe
Verdict:
Suspicious activity
Analysis date:
2022-01-12 10:33:10 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
DNS request
Searching for the window
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Mokes
Status:
Malicious
First seen:
2022-01-12 04:27:17 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
28 of 43 (65.12%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:arkei discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Arkei Stealer Payload
Arkei
Unpacked files
SH256 hash:
ae2678f29b35f4b86d8547a27ed8b9aef386afd03596c79f72dcb6945a356129
MD5 hash:
068b9c18778c7bcc4dcde3879d8c50a3
SHA1 hash:
05c4a8a893e84077c0eca2adeb03f832cb82df06
SH256 hash:
766a6e0ae0c481363de94581770216bec512668c7c6bafd3910fbc85e47823d7
MD5 hash:
8ad995ded72bfb869422e6abb35f38e0
SHA1 hash:
265922555ff8e4fe52ffe628da53ea22eaa19b49
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 766a6e0ae0c481363de94581770216bec512668c7c6bafd3910fbc85e47823d7

(this sample)

  
Delivery method
Distributed via web download

Comments