MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a6a4ea6a622b43f7f7b866d147b70db495c7595ce85895c55e5a2b9fbf4291a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: a6a4ea6a622b43f7f7b866d147b70db495c7595ce85895c55e5a2b9fbf4291a2
SHA3-384 hash: 495af2419529a7fe9e7dc06b38b5cb7558146d4a7f75c4c570a719282aaaf044514e884bc9028f8c61369b7ec05b133d
SHA1 hash: b01228fa5416dc0eab9e5534695235d504610643
MD5 hash: c872858300f0be9b70ac56056032736d
humanhash: magazine-pluto-quiet-low
File name:c872858300f0be9b70ac56056032736d
Download: download sample
Signature ArkeiStealer
File size:645'632 bytes
First seen:2021-09-15 10:40:37 UTC
Last seen:2021-09-15 12:07:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8291759aef0e46c8057b5d52bd12239f (3 x ArkeiStealer, 3 x RedLineStealer, 1 x RaccoonStealer)
ssdeep 12288:4tZr76uCE8faxEjoZaY7r3+UZ7ficpQoci1YvxVrHcSOPON4r2x5n9zZanYMQFTL:Cr76ZbJoVH+UZppJ27HcSOMfb9sDQFTL
Threatray 2'874 similar samples on MalwareBazaar
TLSH T1A1D412163281C872C5A910B18979CEB55F76BC2327B4874BB6B83B2F3F713C05666366
dhash icon b8b078cccacccc01 (6 x RaccoonStealer, 4 x RedLineStealer, 3 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c872858300f0be9b70ac56056032736d
Verdict:
Malicious activity
Analysis date:
2021-09-15 10:42:46 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Self deletion via cmd delete
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-09-15 10:41:06 UTC
AV detection:
21 of 41 (51.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:1008 discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Vidar Stealer
Vidar
Malware Config
C2 Extraction:
https://dimonbk83.tumblr.com/
Unpacked files
SH256 hash:
d18386db720fdaa063eaa4d93d89d245e7af36ba6b4532319ca6c3656b950319
MD5 hash:
0da0d71d642d0b427fa0dfbbcc798529
SHA1 hash:
785abc95a0475b3670bdcd2a995b8ccdbcfb18a2
SH256 hash:
a6a4ea6a622b43f7f7b866d147b70db495c7595ce85895c55e5a2b9fbf4291a2
MD5 hash:
c872858300f0be9b70ac56056032736d
SHA1 hash:
b01228fa5416dc0eab9e5534695235d504610643
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe a6a4ea6a622b43f7f7b866d147b70db495c7595ce85895c55e5a2b9fbf4291a2

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-15 10:40:38 UTC

url : hxxp://93.157.62.185/filename.exe