MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 886eb07af379b0e85daff71698af32d2446f3af6f3a813ac7d71060a4639719f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 886eb07af379b0e85daff71698af32d2446f3af6f3a813ac7d71060a4639719f
SHA3-384 hash: e8068d1f492c134f51f6989686d91dc4feaa3f1472b882fdb513d2c0e4e663960636a2f5da310479b2a80f631df65a7c
SHA1 hash: 6ffaac587de03785c65d27c6ee42404a762378eb
MD5 hash: 700ef938c9a4cb88f83ff466309ebe75
humanhash: zebra-shade-alaska-monkey
File name:Kaspersky Internet Security crack.exe
Download: download sample
Signature ArkeiStealer
File size:2'554'797 bytes
First seen:2022-06-05 13:10:17 UTC
Last seen:2022-06-05 13:43:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5dd6748a8bf8c3a3d51aac89447af978 (11 x RedLineStealer, 8 x ArkeiStealer)
ssdeep 49152:qMgoOtAyhVhYi2vCefT1DKsY0/vm+6JQI:qMgoOtAyhVhYiDefT12sY03k
Threatray 4'277 similar samples on MalwareBazaar
TLSH T1B1C51A135A8B0E75DDC27BB4A1CF633A9734EE30CA2A9B7FF609C53559532C4681A702
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter JaffaCakes118
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
446
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://www.mediafire.com/file/mq35rgbf7kfgk1w/Roblox_Executor_download.rar/file
Verdict:
Malicious activity
Analysis date:
2022-06-05 06:46:45 UTC
Tags:
trojan stealer loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Launching a process
Searching for synchronization primitives
Сreating synchronization primitives
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Creating a window
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug babar overlay packed redline spyeye wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-06-05 09:35:16 UTC
File Type:
PE (Exe)
AV detection:
18 of 24 (75.00%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
spyware stealer suricata
Behaviour
Checks processor information in registry
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Reads local data of messenger clients
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer
Unpacked files
SH256 hash:
2a9fd76412a9062cb5f5faaa1079da469ea1a9b1b1b01a381a3837d26d5bbd81
MD5 hash:
595deb7a1a4ed2cc6af8e01c2f825919
SHA1 hash:
0b5133c8e43a9d46a3bc03f8f540bbaf15ee7e9a
SH256 hash:
886eb07af379b0e85daff71698af32d2446f3af6f3a813ac7d71060a4639719f
MD5 hash:
700ef938c9a4cb88f83ff466309ebe75
SHA1 hash:
6ffaac587de03785c65d27c6ee42404a762378eb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe 886eb07af379b0e85daff71698af32d2446f3af6f3a813ac7d71060a4639719f

(this sample)

  
Delivery method
Distributed via web download

Comments