MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a06867c5e8f32e4f33fc0455b26a792eb1647178918628765aec756c1a21c382. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: a06867c5e8f32e4f33fc0455b26a792eb1647178918628765aec756c1a21c382
SHA3-384 hash: dcc5cc3bfeb10fc5adc7a77a138691dce45c3e4bd3c4bcdee811d79145b50e0c1080aebcf7c82286a62459611fcf0138
SHA1 hash: 4f694c3381ecf7eed02be3a1b4a47717b2684b82
MD5 hash: 5d471f5bdbf8f362b7a9ebd79ac00639
humanhash: bacon-bakerloo-muppet-stream
File name:file
Download: download sample
Signature ArkeiStealer
File size:323'584 bytes
First seen:2022-11-21 15:22:17 UTC
Last seen:2022-11-21 16:46:09 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 236e1feeea6662069dc104481c5060a0 (1 x ArkeiStealer)
ssdeep 6144:V/RyoLa/IbDOAiGGfmBVYOfyHsYSW/TTdfKTrNr/tyYDa+dXAaWx:V/fLEIbmffmBVYtHxS6grNc6dZW
Threatray 1'114 similar samples on MalwareBazaar
TLSH T13B642360A4D10154FCB206BBCAE56F9DC16E75E31B1710C3378868DE0D46EFABE742A9
TrID 30.2% (.EXE) Win64 Executable (generic) (10523/12/4)
18.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
14.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.9% (.EXE) Win32 Executable (generic) (4505/5/1)
5.9% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter jstrosch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
321
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
No threats detected
Analysis date:
2022-11-21 15:23:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Creating a window
Running batch commands
Creating a process with a hidden window
Launching a process
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found API chain indicative of debugger detection
Injects a PE file into a foreign processes
Machine Learning detection for sample
Self deletion via cmd or bat file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Bandra
Status:
Malicious
First seen:
2022-11-21 10:21:44 UTC
File Type:
PE (Exe)
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:1148 discovery spyware stealer
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Vidar
Malware Config
C2 Extraction:
https://t.me/deadftx
https://www.tiktok.com/@user6068972597711
Unpacked files
SH256 hash:
a06867c5e8f32e4f33fc0455b26a792eb1647178918628765aec756c1a21c382
MD5 hash:
5d471f5bdbf8f362b7a9ebd79ac00639
SHA1 hash:
4f694c3381ecf7eed02be3a1b4a47717b2684b82
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe a06867c5e8f32e4f33fc0455b26a792eb1647178918628765aec756c1a21c382

(this sample)

  
Delivery method
Distributed via web download

Comments