MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e481ee40af6227bc65f7334cffa28ef661ab49cb800ce383aed1cec82515ae5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: 7e481ee40af6227bc65f7334cffa28ef661ab49cb800ce383aed1cec82515ae5
SHA3-384 hash: 1ac7ed18d29e18b81c9e4df55cf725cbc40cd0e9bd6ef70db4f16a0b75a94c85cf2af49535ed942bc7e27f090a9697b4
SHA1 hash: a3d0713358bc56c25afd840fe4f6d292a1bb19a3
MD5 hash: 9815939e8451de53eb7acd436da80fa7
humanhash: jersey-connecticut-bravo-football
File name:Setup.exe
Download: download sample
Signature ArkeiStealer
File size:3'979'264 bytes
First seen:2022-12-11 08:55:12 UTC
Last seen:2022-12-11 10:31:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a56f115ee5ef2625bd949acaeec66b76 (53 x Stealc, 48 x PureHVNC, 35 x CoinMiner)
ssdeep 98304:yV69dw8FHKz5d5OKA3IoMnifAmtwDn8xX4Y2qJgazXCq:yo9dwIqz75OtMnWeDn8+qJXzy
Threatray 7'080 similar samples on MalwareBazaar
TLSH T148061252FB40CEA3C55C0134AD1B83EA2EB1FD52AE0676573388B70D6EB33997B46158
TrID 38.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.6% (.ICL) Windows Icons Library (generic) (2059/9)
15.4% (.EXE) OS/2 Executable (generic) (2029/13)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 68ee76e6c2e8e4e0 (1 x ArkeiStealer)
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
188
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Launching a process
Searching for analyzing tools
Searching for the window
Creating a file
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Stealing user critical data
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 764898 Sample: Setup.exe Startdate: 11/12/2022 Architecture: WINDOWS Score: 100 63 Multi AV Scanner detection for domain / URL 2->63 65 Antivirus detection for URL or domain 2->65 67 Antivirus detection for dropped file 2->67 69 9 other signatures 2->69 9 Setup.exe 1 2->9         started        process3 file4 43 C:\Users\user\AppData\Local\...\Setup.exe.log, CSV 9->43 dropped 83 Query firmware table information (likely to detect VMs) 9->83 85 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->85 87 Writes to foreign memory regions 9->87 89 3 other signatures 9->89 13 InstallUtil.exe 23 9->13         started        signatures5 process6 dnsIp7 57 149.154.167.99, 443, 49695 TELEGRAMRU United Kingdom 13->57 59 89.208.104.172, 49698, 80 PSKSET-ASRU Russian Federation 13->59 61 2 other IPs or domains 13->61 45 C:\Users\user\AppData\Local\...\bebra[1].exe, PE32+ 13->45 dropped 47 C:\Users\user\AppData\Local\...\Clip1[1].exe, PE32+ 13->47 dropped 49 C:\ProgramData\86048907568499723052.exe, PE32+ 13->49 dropped 51 C:\ProgramData\27083656440494811806.exe, PE32+ 13->51 dropped 91 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 13->91 93 Tries to harvest and steal browser information (history, passwords, etc) 13->93 95 Tries to steal Crypto Currency Wallets 13->95 18 86048907568499723052.exe 3 13->18         started        22 27083656440494811806.exe 13->22         started        25 cmd.exe 1 13->25         started        file8 signatures9 process10 dnsIp11 41 C:\...\WindowsPaint-Ver1.1.3.9.exe, PE32+ 18->41 dropped 71 Multi AV Scanner detection for dropped file 18->71 73 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 18->73 75 Machine Learning detection for dropped file 18->75 81 2 other signatures 18->81 27 schtasks.exe 1 18->27         started        53 youtube-ui.l.google.com 142.250.185.238 GOOGLEUS United States 22->53 55 www.youtube.com 22->55 77 Antivirus detection for dropped file 22->77 79 Tries to harvest and steal browser information (history, passwords, etc) 22->79 29 cmd.exe 1 22->29         started        31 conhost.exe 25->31         started        33 timeout.exe 1 25->33         started        file12 signatures13 process14 process15 35 conhost.exe 27->35         started        37 conhost.exe 29->37         started        39 choice.exe 1 29->39         started       
Threat name:
Win64.Infostealer.Bandra
Status:
Malicious
First seen:
2022-12-10 00:57:22 UTC
File Type:
PE+ (Exe)
Extracted files:
24
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:1707 evasion spyware stealer themida trojan
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Checks BIOS information in registry
Loads dropped DLL
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar
Malware Config
C2 Extraction:
https://t.me/dishasta
https://steamcommunity.com/profiles/76561199441933804
Unpacked files
SH256 hash:
7e481ee40af6227bc65f7334cffa28ef661ab49cb800ce383aed1cec82515ae5
MD5 hash:
9815939e8451de53eb7acd436da80fa7
SHA1 hash:
a3d0713358bc56c25afd840fe4f6d292a1bb19a3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments