MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab8d377d550ebae841ab75d2d6257fb38960efc049037bbd2468483871897e5d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 11 File information Comments

SHA256 hash: ab8d377d550ebae841ab75d2d6257fb38960efc049037bbd2468483871897e5d
SHA3-384 hash: 4f9bd862e3bedf92900d74251849118ea40f769ea7c8f424fc46eb0d3995a48c242a043f39b97207c57eac45debd36be
SHA1 hash: efca4dad94bd2e73b785caaca9f44c46843ee704
MD5 hash: 7dc04c099e434e8d7128094ca400683e
humanhash: ink-king-florida-uniform
File name:Bear_Vpn.exe
Download: download sample
Signature ArkeiStealer
File size:4'408'832 bytes
First seen:2021-07-14 14:37:00 UTC
Last seen:2021-07-14 16:11:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'599 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 98304:GhER59YPBX9Qv8X61pJFWR+oTrd9kLNUPeLGMSn1jjYSWI:5R3weu6lFWRNZOLNUPec1j05
Threatray 1'247 similar samples on MalwareBazaar
TLSH T16F16F04122F04211FEC4A7A5EE7D3B9B0AAB3F833501C97E5974218D28A1AD55EEF347
Reporter CholeVallabh
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
sahiba_4.txt
Verdict:
Malicious activity
Analysis date:
2021-07-14 14:28:57 UTC
Tags:
trojan stealer vidar loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer Oski RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the document folder of the user
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Posts data to a JPG file (protocol mismatch)
Sample uses process hollowing technique
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Sigma detected: System File Execution Location Anomaly
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Backstage Stealer
Yara detected Oski Stealer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 448926 Sample: Bear_Vpn.exe Startdate: 14/07/2021 Architecture: WINDOWS Score: 100 113 google.vrthcobj.com 2->113 115 195.201.225.248 HETZNER-ASDE Germany 2->115 117 2 other IPs or domains 2->117 145 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->145 147 Multi AV Scanner detection for domain / URL 2->147 149 Found malware configuration 2->149 151 16 other signatures 2->151 11 Bear_Vpn.exe 7 2->11         started        14 haleng.exe 2->14         started        signatures3 process4 dnsIp5 73 C:\Users\user\AppData\Local\Temp\zp.exe, PE32 11->73 dropped 75 C:\Users\user\AppData\Local\...\playfile.exe, PE32 11->75 dropped 77 C:\Users\user\AppData\Local\Temp\jhuuee.exe, PE32 11->77 dropped 81 3 other files (1 malicious) 11->81 dropped 18 prestige.exe 10 11->18         started        21 playfile.exe 4 11->21         started        24 jhuuee.exe 3 2 11->24         started        29 2 other processes 11->29 137 157.240.17.35 FACEBOOKUS United States 14->137 139 ip-api.com 14->139 79 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 14->79 dropped 175 May check the online IP address of the machine 14->175 27 jfiag3g_gg.exe 14->27         started        file6 signatures7 process8 dnsIp9 67 C:\Users\user\AppData\...\setup_installer.exe, PE32 18->67 dropped 31 setup_installer.exe 18->31         started        69 C:\Users\user\AppData\Local\...\svchost.exe, PE32 21->69 dropped 161 Sample uses process hollowing technique 21->161 163 Drops PE files with benign system names 21->163 34 svchost.exe 193 21->34         started        123 ip-api.com 208.95.112.1, 49719, 49726, 80 TUT-ASUS United States 24->123 125 star-mini.c10r.facebook.com 157.240.195.35, 443, 49723 FACEBOOKUS United States 24->125 129 2 other IPs or domains 24->129 71 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 24->71 dropped 165 May check the online IP address of the machine 24->165 38 jfiag3g_gg.exe 24->38         started        40 jfiag3g_gg.exe 1 24->40         started        127 176.113.115.136 SELECTELRU Russian Federation 29->127 167 Creates processes via WMI 29->167 42 zp.exe 29->42         started        44 conhost.exe 29->44         started        46 WerFault.exe 29->46         started        file10 signatures11 process12 dnsIp13 91 C:\Users\user\AppData\...\setup_install.exe, PE32 31->91 dropped 93 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 31->93 dropped 95 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 31->95 dropped 105 5 other files (none is malicious) 31->105 dropped 48 setup_install.exe 31->48         started        119 a343345.me 198.54.114.131, 49721, 80 NAMECHEAP-NETUS United States 34->119 97 C:\ProgramData\vcruntime140.dll, PE32 34->97 dropped 107 6 other files (none is malicious) 34->107 dropped 153 System process connects to network (likely due to code injection or exploit) 34->153 155 Detected unpacking (changes PE section rights) 34->155 157 Detected unpacking (overwrites its own PE header) 34->157 159 2 other signatures 34->159 121 192.168.2.1 unknown unknown 38->121 99 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 42->99 dropped 101 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 42->101 dropped 103 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 42->103 dropped 52 conhost.exe 42->52         started        file14 signatures15 process16 dnsIp17 109 wxkeww.xyz 172.67.179.203, 49731, 80 CLOUDFLARENETUS United States 48->109 111 127.0.0.1 unknown unknown 48->111 141 Detected unpacking (changes PE section rights) 48->141 143 Performs DNS queries to domains with low reputation 48->143 54 cmd.exe 48->54         started        56 cmd.exe 48->56         started        58 conhost.exe 48->58         started        signatures18 process19 process20 60 karotima_1.exe 54->60         started        65 karotima_2.exe 56->65         started        dnsIp21 131 136.144.41.201 WORLDSTREAMNL Netherlands 60->131 133 37.0.11.41 WKD-ASIE Netherlands 60->133 135 11 other IPs or domains 60->135 83 C:\Users\...\oFzpE8vOfpWPTkFkH8f3vFUn.exe, PE32 60->83 dropped 85 C:\Users\...\mZ883jpOy4qbdNd5mVqWXPwv.exe, PE32 60->85 dropped 87 C:\Users\...\gYit39aAWJbuoiIeQqNdCw4U.exe, PE32 60->87 dropped 89 41 other files (31 malicious) 60->89 dropped 169 Drops PE files to the document folder of the user 60->169 171 May check the online IP address of the machine 60->171 173 Disable Windows Defender real time protection (registry) 60->173 file22 signatures23
Threat name:
ByteCode-MSIL.Backdoor.Mokes
Status:
Malicious
First seen:
2021-07-14 14:37:12 UTC
AV detection:
18 of 29 (62.07%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:oski aspackv2 discovery evasion infostealer persistence spyware stealer trojan upx
Behaviour
Checks processor information in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Suspicious use of NtCreateUserProcessOtherParentProcess
Modifies Windows Defender Real-time Protection settings
Oski
Process spawned unexpected child process
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
a343345.me
Unpacked files
SH256 hash:
544747fff8e88a14d7b18f649ddde747dcd798cf24238e4294097dbed903ad86
MD5 hash:
ecb0c724a25e14a7e24be766a03d0857
SHA1 hash:
1a86e570f4d3ac4a597a1c3eacf82087e8fdb124
SH256 hash:
758e40068e6c747c8b70f86e9d42394c1196b3077d7d0c90ecc0b5bc01cd56a8
MD5 hash:
d7eea408c292c6ea168f9328eb5b4526
SHA1 hash:
6f9ddc9ed9ec403c457bf9c5d997a817b057459b
SH256 hash:
c903df66e3e3c3dc0759b666896fe7f6816d691446044bdb1dfd4ff90904935a
MD5 hash:
dbbfe7aab44f31c2f03da866ed6a2288
SHA1 hash:
2950979d1dc657d95908a0e1d65b7f48173810f0
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
3c648992d1546155e984774bc4b6ca5f3ffd83d084f4e0d08346a08a95e30aa2
MD5 hash:
de1559dbbf4a543bd6ea181340105ae5
SHA1 hash:
d88509684b84254f2dc27f6ff86d6e20540b21b7
SH256 hash:
dff28812909d091652d5c6617c38dd4e60f80c6a6c4287d9aa65ad309e96093a
MD5 hash:
499ddcc70150ef2df77600b7865896fb
SHA1 hash:
43877ca0e904073af8f720b622ece53354eca649
Detections:
win_oski_g0 win_oski_auto
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
403a06f12a91f00f5834250436d0050c6387fee2c74101d0aa9697940a294b56
MD5 hash:
6800f4c8b2d1326dab120a6ad2b99ff6
SHA1 hash:
d45ad1d4567dd41b9676885c1d7c5e5ef8fe5fc0
SH256 hash:
10c21b4bc6bb419dbb63ea2635ab210c330744e84658380965d8baa3a4bbcfd6
MD5 hash:
a5372e8d80d48d3a928b7030a0dfd3d5
SHA1 hash:
ce627e5592e97b493a9e582f7bc122bb75e1cc1a
SH256 hash:
f55ae614fb938d3f4d7ae242692d1450488df9b8aef2eeb6bb7677b7e5b2f224
MD5 hash:
eb8258fb16479b239249ba5b0d1011ec
SHA1 hash:
a3f449206382417ea53bc2996c91223dd7d34f16
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
355b3e5e2ed5cc802085c201ca3544709fb3949fcf22f099b2af3de473375b98
MD5 hash:
91261199b5b8b54fa58932f284a2159c
SHA1 hash:
4a45772873b9682278d1cbc7530af4d812bf2b79
SH256 hash:
0d8bac868ebbc5e450c3da778c6453f88042addb155d9ca810c65f47e32427d7
MD5 hash:
a70932e5fa3a36ffd03a94f236920ed1
SHA1 hash:
ac8750380807940f6121c072d7f9744239ce8515
SH256 hash:
ab8d377d550ebae841ab75d2d6257fb38960efc049037bbd2468483871897e5d
MD5 hash:
7dc04c099e434e8d7128094ca400683e
SHA1 hash:
efca4dad94bd2e73b785caaca9f44c46843ee704
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.oski.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments