MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ae672a54491d01385af7932cc9524889f6314dd4b4b8b9a846dfa1ffedaa8c61. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 3 File information Comments

SHA256 hash: ae672a54491d01385af7932cc9524889f6314dd4b4b8b9a846dfa1ffedaa8c61
SHA3-384 hash: fd431a155463a0efabb506431719134d8c6d6191ed3f8e6cb4df33e88b10f24e5e1ec70d486d5d0109f50419ad0043ca
SHA1 hash: 247a6817bb354c0784f7a112c953646d509bd120
MD5 hash: f6383fce1ab0d6597440259f9a1e9ddc
humanhash: ten-fix-fifteen-july
File name:payment advice.exe
Download: download sample
Signature ArkeiStealer
File size:280'406 bytes
First seen:2022-05-13 08:20:47 UTC
Last seen:2022-05-23 11:56:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 61259b55b8912888e90f516ca08dc514 (1'059 x Formbook, 741 x AgentTesla, 427 x GuLoader)
ssdeep 6144:LOtIOQv1dtTRqXIa/lSUwGed2hLzEw6O/qX2bwVvRL:LOLI1dtFqFg712pzn6S62bwhRL
Threatray 4'450 similar samples on MalwareBazaar
TLSH T14C54120052A5D497E4D1E2322E3E57124EFB993F20E8870F2704E7493EAA6A6FD5F705
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter pr0xylife
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
4
# of downloads :
279
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a window
Creating a process from a recently created file
DNS request
Creating a file
Reading critical registry keys
Delayed writing of the file
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Stealing user critical data
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe formbook overlay packed shell32.dll vobfus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Oski Stealer
Verdict:
Malicious
Result
Threat name:
Oski Stealer, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Downloads files with wrong headers with respect to MIME Content-Type
Executable has a suspicious name (potential lure to open the executable)
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Posts data to a JPG file (protocol mismatch)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Oski Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 625916 Sample: payment advice.exe Startdate: 13/05/2022 Architecture: WINDOWS Score: 100 42 Snort IDS alert for network traffic 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 11 other signatures 2->48 9 payment advice.exe 19 2->9         started        process3 file4 34 C:\Users\user\AppData\Local\Temp\mhxyp.exe, PE32 9->34 dropped 12 mhxyp.exe 9->12         started        process5 signatures6 50 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 12->50 52 Found evasive API chain (may stop execution after checking locale) 12->52 54 Injects a PE file into a foreign processes 12->54 15 mhxyp.exe 196 12->15         started        process7 dnsIp8 36 spetralnet2.com 142.4.0.135, 49773, 49774, 49777 UNIFIEDLAYER-AS-1US United States 15->36 26 C:\ProgramData\vcruntime140.dll, PE32 15->26 dropped 28 C:\ProgramData\sqlite3.dll, PE32 15->28 dropped 30 C:\ProgramData\softokn3.dll, PE32 15->30 dropped 32 4 other files (none is malicious) 15->32 dropped 38 Tries to harvest and steal browser information (history, passwords, etc) 15->38 40 Tries to steal Crypto Currency Wallets 15->40 20 cmd.exe 1 15->20         started        file9 signatures10 process11 process12 22 taskkill.exe 1 20->22         started        24 conhost.exe 20->24         started       
Threat name:
Win32.Trojan.Jaik
Status:
Malicious
First seen:
2022-05-13 06:43:06 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:oski discovery infostealer spyware stealer suricata
Behaviour
Checks processor information in registry
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Oski
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
Malware Config
C2 Extraction:
spetralnet2.com
Unpacked files
SH256 hash:
ae672a54491d01385af7932cc9524889f6314dd4b4b8b9a846dfa1ffedaa8c61
MD5 hash:
f6383fce1ab0d6597440259f9a1e9ddc
SHA1 hash:
247a6817bb354c0784f7a112c953646d509bd120
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_oski_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.oski.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments