MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a334fa92fab1199f16a272b0f2f63465750f98bed946d23f8f7ae498206ca553. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 4 File information Comments

SHA256 hash: a334fa92fab1199f16a272b0f2f63465750f98bed946d23f8f7ae498206ca553
SHA3-384 hash: 92cb1b45104ba309b703db9acbe147833346f153901c50dc5d65cb18bce0ca450249d84c11afc395df950b995fe284f7
SHA1 hash: e800be40b0515d06d722b69c9efa5018e5e85478
MD5 hash: 9b28295f19caf9fd60bde185a13188df
humanhash: delta-cat-cup-diet
File name:9b28295f19caf9fd60bde185a13188df.exe
Download: download sample
Signature ArkeiStealer
File size:2'766'160 bytes
First seen:2022-10-25 03:25:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 09d7f8249a36bc0ff07a4d3c56b1a15e (6 x RedLineStealer, 2 x ArkeiStealer, 2 x DCRat)
ssdeep 24576:i4fWaW/ti/2jxYCYTlpnAC1Mv1dJc+KV7rUHRodCgAJUdMELOlKfJrl3RuQ5531I:hxW/to2+eUgxoogWUdME7l3i
TLSH T131D52B139A9B0D75DDD23BB4A1CB633A9734ED30CA2A9F7FB608C43959532C46C1A742
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
http://78.47.204.168/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://78.47.204.168/ https://threatfox.abuse.ch/ioc/891320/

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
9b28295f19caf9fd60bde185a13188df.exe
Verdict:
Malicious activity
Analysis date:
2022-10-25 03:28:59 UTC
Tags:
redline trojan rat loader stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found hidden mapped module (file has been removed from disk)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 729827 Sample: RM1Qrb7RzL.exe Startdate: 25/10/2022 Architecture: WINDOWS Score: 100 100 t.me 2->100 116 Snort IDS alert for network traffic 2->116 118 Malicious sample detected (through community Yara rule) 2->118 120 Antivirus detection for URL or domain 2->120 122 9 other signatures 2->122 11 RM1Qrb7RzL.exe 1 2->11         started        14 svcupdater.exe 14 2 2->14         started        17 chrome.exe 2->17         started        19 chrome.exe 2->19         started        signatures3 process4 dnsIp5 146 Writes to foreign memory regions 11->146 148 Injects a PE file into a foreign processes 11->148 21 AppLaunch.exe 15 10 11->21         started        26 conhost.exe 11->26         started        112 clipper.guru 45.159.189.115, 49704, 49721, 80 HOSTING-SOLUTIONSUS Netherlands 14->112 114 192.168.2.1 unknown unknown 14->114 150 Multi AV Scanner detection for dropped file 14->150 152 Machine Learning detection for dropped file 14->152 154 Adds a directory exclusion to Windows Defender 17->154 28 powershell.exe 17->28         started        signatures6 process7 dnsIp8 102 77.73.134.24, 49699, 80 FIBEROPTIXDE Kazakhstan 21->102 104 api.ip.sb 21->104 106 2 other IPs or domains 21->106 84 C:\Users\user\AppData\Local\...\test.exe, PE32 21->84 dropped 86 C:\Users\user\AppData\Local\...\ofg.exe, PE32 21->86 dropped 88 C:\Users\user\AppData\Local\...\chrome.exe, MS-DOS 21->88 dropped 90 C:\Users\user\AppData\Local\...\brave.exe, PE32+ 21->90 dropped 124 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 21->124 126 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 21->126 128 Tries to harvest and steal browser information (history, passwords, etc) 21->128 130 Tries to steal Crypto Currency Wallets 21->130 30 chrome.exe 21->30         started        34 brave.exe 21->34         started        36 ofg.exe 5 21->36         started        38 test.exe 21->38         started        file9 signatures10 process11 file12 92 C:\WindowsbehaviorgraphoogleUpdate.exe, PE32 30->92 dropped 156 Multi AV Scanner detection for dropped file 30->156 158 Detected unpacking (changes PE section rights) 30->158 160 Machine Learning detection for dropped file 30->160 170 5 other signatures 30->170 40 GoogleUpdate.exe 30->40         started        43 GoogleUpdate.exe 30->43         started        56 6 other processes 30->56 94 C:\Users\user\AppData\Local\Temp\C7D8.tmp, PE32+ 34->94 dropped 96 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 34->96 dropped 162 Writes to foreign memory regions 34->162 164 Modifies the context of a thread in another process (thread injection) 34->164 166 Found hidden mapped module (file has been removed from disk) 34->166 168 Maps a DLL or memory area into another process 34->168 46 cmd.exe 34->46         started        48 cmd.exe 34->48         started        50 powershell.exe 34->50         started        52 powershell.exe 34->52         started        98 C:\Users\user\AppData\...\svcupdater.exe, PE32 36->98 dropped 54 cmd.exe 1 36->54         started        58 2 other processes 38->58 signatures13 process14 dnsIp15 132 Detected unpacking (changes PE section rights) 40->132 134 Detected unpacking (overwrites its own PE header) 40->134 136 Uses netsh to modify the Windows network and firewall settings 40->136 138 Modifies the windows firewall 40->138 108 141.95.93.175, 443, 49706, 49708 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 43->108 110 api.peer2profit.com 172.66.43.60, 443, 49705, 49707 CLOUDFLARENETUS United States 43->110 60 netsh.exe 43->60         started        62 netsh.exe 43->62         started        64 netsh.exe 43->64         started        70 5 other processes 46->70 72 6 other processes 48->72 66 conhost.exe 50->66         started        68 conhost.exe 52->68         started        140 Uses schtasks.exe or at.exe to add and modify task schedules 54->140 142 Uses powercfg.exe to modify the power settings 54->142 144 Modifies power options to not sleep / hibernate 54->144 74 2 other processes 54->74 76 3 other processes 56->76 signatures16 process17 process18 78 conhost.exe 60->78         started        80 conhost.exe 62->80         started        82 conhost.exe 64->82         started       
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-10-12 00:56:10 UTC
File Type:
PE (Exe)
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar botnet:1707 botnet:@lovpainlov evasion infostealer spyware stealer upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Stops running service(s)
UPX packed file
Modifies security service
RedLine
RedLine payload
Vidar
Malware Config
C2 Extraction:
77.73.134.24:80
https://t.me/slivetalks
https://c.im/@xinibin420
Unpacked files
SH256 hash:
6539807158eda27fc6598b119abd4e929bd84eedde1352b6499851229067db7f
MD5 hash:
f564e3e68cb6ff975aeb7b54de40f76d
SHA1 hash:
be37a4b3040fc44b36f5628083bef44cefec7cf8
Detections:
redline
SH256 hash:
a334fa92fab1199f16a272b0f2f63465750f98bed946d23f8f7ae498206ca553
MD5 hash:
9b28295f19caf9fd60bde185a13188df
SHA1 hash:
e800be40b0515d06d722b69c9efa5018e5e85478
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AppLaunch
Author:iam-py-test
Description:Detect files referencing .Net AppLaunch.exe
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments