MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 79ec5b54ddd1cbc30d23e679fa8d1740884aa29e89f10a3020c559f893ab4790. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 5 File information Comments

SHA256 hash: 79ec5b54ddd1cbc30d23e679fa8d1740884aa29e89f10a3020c559f893ab4790
SHA3-384 hash: 186c47db9c8c7ae1ce89d4472624745accbf483c5c7748425172b6df6c393d8c800cc8b384414e9b7c9e21ad97a9d75c
SHA1 hash: 512bd1217144b47c73ab0b7c06d0577adaa6fea5
MD5 hash: a39016d6379dbe90cc7e38dd22c0bd75
humanhash: north-monkey-romeo-papa
File name:npp.Installer.x64.exe
Download: download sample
Signature ArkeiStealer
File size:455'680 bytes
First seen:2023-01-25 17:05:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 6144:5axTZm8PfwTjDvdyyhq58k2GO1r8wBCmlmbLvdX05Yco2D6roq+kbkrY+w:5a3fwTd6E1TBC1bLdEFoCULdQ0+w
Threatray 5'219 similar samples on MalwareBazaar
TLSH T1ACA4BFE38EF87D61E016287374A0603C27EF5E0D8869D735D1AFA20A7A12AD315D5F27
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 00414f4f4f4f4700 (14 x CoinMiner, 12 x RedLineStealer, 12 x NodeLoader)
Reporter stoerchl
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
219
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
npp.Installer.x64.exe
Verdict:
Malicious activity
Analysis date:
2023-01-25 17:06:12 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a recently created process
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Creating a window
Running batch commands
Creating a process with a hidden window
Launching a process
Stealing user critical data
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm obfuscated packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Contains functionality to compare user and computer (likely to detect sandboxes)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Self deletion via cmd or bat file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Vidar
Status:
Malicious
First seen:
2023-01-25 17:11:28 UTC
File Type:
PE (.Net Exe)
Extracted files:
18
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:827 discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Vidar
Malware Config
C2 Extraction:
https://t.me/litlebey
https://steamcommunity.com/profiles/76561199472399815
Unpacked files
SH256 hash:
950a810e164633e600cea39c942458d9acc111e071d4dda3e189e9bb02a3e3fd
MD5 hash:
31a44245595ba250843fc2712cb7c955
SHA1 hash:
e75d88d0e648739791283a729d529b56d8b77af7
SH256 hash:
79ec5b54ddd1cbc30d23e679fa8d1740884aa29e89f10a3020c559f893ab4790
MD5 hash:
a39016d6379dbe90cc7e38dd22c0bd75
SHA1 hash:
512bd1217144b47c73ab0b7c06d0577adaa6fea5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_EXE_Packed_SmartAssembly
Author:ditekSHen
Description:Detects executables packed with SmartAssembly
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Telegram_Links

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 79ec5b54ddd1cbc30d23e679fa8d1740884aa29e89f10a3020c559f893ab4790

(this sample)

  
Delivery method
Distributed via web download

Comments