MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b11bd18587058601cde1be46ec722f2ddc96fddd976f3a263e4d0358e8e08865. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 13 File information Comments

SHA256 hash: b11bd18587058601cde1be46ec722f2ddc96fddd976f3a263e4d0358e8e08865
SHA3-384 hash: 50e16e90fa64cc11606a37a5fa9f8e0abf15719646925535da5e601a2e70bae3ccdb6cca232981968309e960aaf0dd92
SHA1 hash: 3ddeda3f503ed50175c27beb1c1f4b537728f9d9
MD5 hash: ad8febdd16bfbb5c4d4730c7b5912e82
humanhash: xray-fix-missouri-sodium
File name:ad8febdd16bfbb5c4d4730c7b5912e82.exe
Download: download sample
Signature ArkeiStealer
File size:11'447'492 bytes
First seen:2021-04-05 03:10:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 196608:itv+7MBr0wCCoxY85JzuXG03mB0ocqsuAssaksSth7GSH28wi8Fz5aK7RBXSdt:w+7MmdB5JzSwB02ExaarRHHs5aKlBCL
Threatray 679 similar samples on MalwareBazaar
TLSH 94B6330A669642B2E11B5C7E4907E2F9F0B27F1D443C610FB6EE0A9C56733DD2C025AE
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
http://cache.krishgarden.com/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://cache.krishgarden.com/ https://threatfox.abuse.ch/ioc/6764/

Intelligence


File Origin
# of uploads :
1
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the Program Files subdirectories
Deleting a recently created file
Creating a process from a recently created file
Creating a process with a hidden window
Sending a UDP request
Creating a file in the Program Files directory
Searching for the window
Creating a file
Creating a file in the %AppData% subdirectories
DNS request
Sending a custom TCP request
Reading critical registry keys
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Launching a process
Running batch commands
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching the process to create tasks for the scheduler
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Socelars Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Searches for Windows Mail specific files
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Tries to detect debuggers by setting the trap flag for special instructions
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 381801 Sample: xqtEOiEeHh.exe Startdate: 05/04/2021 Architecture: WINDOWS Score: 100 187 Antivirus detection for URL or domain 2->187 189 Antivirus detection for dropped file 2->189 191 Multi AV Scanner detection for dropped file 2->191 193 19 other signatures 2->193 10 xqtEOiEeHh.exe 16 20 2->10         started        13 haleng.exe 2->13         started        process3 dnsIp4 127 C:\Program Files (x86)\...\paTCMESxvRAw.exe, PE32 10->127 dropped 129 C:\Program Files (x86)\VR\...\lilalmix.exe, PE32 10->129 dropped 131 C:\Program Files (x86)\VR\...\jg7_7wjg.exe, PE32 10->131 dropped 133 9 other files (7 malicious) 10->133 dropped 17 hdMjEFxExOtxc6gxJYLn9ZLm.exe 10->17         started        21 guihuali-game.exe 10->21         started        23 RunWW.exe 85 10->23         started        28 8 other processes 10->28 175 127.0.0.1 unknown unknown 13->175 213 Tries to detect debuggers by setting the trap flag for special instructions 13->213 215 Tries to detect virtualization through RDTSC time measurements 13->215 26 jfiag3g_gg.exe 13->26         started        file5 signatures6 process7 dnsIp8 135 103.155.92.207 TWIDC-AS-APTWIDCLimitedHK unknown 17->135 143 6 other IPs or domains 17->143 75 C:\Users\...\uTA38hKvBzPCetNuMX7lZvxR.exe, PE32 17->75 dropped 77 C:\Users\...\rt9T4tBm6rrU0S2tC3vhfeJs.exe, PE32 17->77 dropped 79 C:\Users\...\qL5EN3ICZDAPIX8fHqimCWLO.exe, PE32 17->79 dropped 85 13 other malicious files 17->85 dropped 30 aSbe7t3ojPhZdR2mtqIqrqNd.exe 17->30         started        33 nuPr9Ir3OJSfTtqBg3j7jkUM.exe 17->33         started        37 A05pyxrMkRmsy7YCio4xRnko.exe 17->37         started        81 C:\Program Files\unins0000.dll, PE32 21->81 dropped 87 5 other files (none is malicious) 21->87 dropped 39 wscript.exe 21->39         started        137 157.90.153.134 REDIRISRedIRISAutonomousSystemES United States 23->137 145 2 other IPs or domains 23->145 89 12 other files (none is malicious) 23->89 dropped 199 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->199 201 Tries to steal Instant Messenger accounts or passwords 23->201 203 Tries to harvest and steal browser information (history, passwords, etc) 23->203 209 2 other signatures 23->209 139 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 28->139 141 208.95.112.1 TUT-ASUS United States 28->141 147 3 other IPs or domains 28->147 83 C:\Users\user\Documents\...\jg7_7wjg.exe, PE32 28->83 dropped 91 7 other files (none is malicious) 28->91 dropped 205 Sample uses process hollowing technique 28->205 207 Injects a PE file into a foreign processes 28->207 41 LabPicV3.tmp 28->41         started        43 wscript.exe 28->43         started        45 lylal220.tmp 28->45         started        47 6 other processes 28->47 file9 signatures10 process11 dnsIp12 217 Sample uses process hollowing technique 30->217 219 Injects a PE file into a foreign processes 30->219 149 45.76.53.14 AS-CHOOPAUS United States 33->149 93 C:\Users\user\AppData\Local\...\Login Data1, SQLite 33->93 dropped 221 Tries to harvest and steal browser information (history, passwords, etc) 33->221 49 rundll32.exe 39->49         started        151 52.95.169.52 AMAZON-02US United States 41->151 95 C:\Users\user\AppData\Local\...\ppppppfy.exe, PE32 41->95 dropped 97 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 41->97 dropped 107 2 other files (none is malicious) 41->107 dropped 52 ppppppfy.exe 41->52         started        56 rundll32.exe 43->56         started        153 52.218.24.80 AMAZON-02US United States 45->153 99 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 45->99 dropped 101 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 45->101 dropped 103 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 45->103 dropped 105 C:\Users\user\AppData\Local\...\Microsoft.exe, PE32 45->105 dropped 58 Microsoft.exe 45->58         started        155 216.58.207.174 GOOGLEUS United States 47->155 157 35.220.162.170 GOOGLEUS United States 47->157 159 3 other IPs or domains 47->159 109 2 other files (none is malicious) 47->109 dropped 60 conhost.exe 47->60         started        62 conhost.exe 47->62         started        64 cmd.exe 47->64         started        file13 signatures14 process15 dnsIp16 177 Writes to foreign memory regions 49->177 179 Allocates memory in foreign processes 49->179 181 Creates a thread in another existing process (thread injection) 49->181 66 svchost.exe 49->66 injected 161 205.185.216.10 HIGHWINDS3US United States 52->161 163 52.95.171.76 AMAZON-02US United States 52->163 165 162.0.210.44 ACPCA Canada 52->165 111 C:\Program Files (x86)\...\Sufuzhiqygo.exe, PE32 52->111 dropped 113 C:\...\Sufuzhiqygo.exe.config, XML 52->113 dropped 115 C:\Users\user\AppData\...\Dyhypebijy.exe, PE32 52->115 dropped 123 2 other files (none is malicious) 52->123 dropped 183 Detected unpacking (overwrites its own PE header) 52->183 185 Searches for Windows Mail specific files 52->185 69 svchost.exe 56->69 injected 167 52.218.61.48 AMAZON-02US United States 58->167 169 52.95.171.40 AMAZON-02US United States 58->169 171 162.0.220.187 ACPCA Canada 58->171 117 C:\Program Files (x86)\...\Lopiheshuzhy.exe, PE32 58->117 dropped 119 C:\...\Lopiheshuzhy.exe.config, XML 58->119 dropped 121 C:\Users\user\AppData\...121upojoqeko.exe, PE32 58->121 dropped 125 2 other files (none is malicious) 58->125 dropped file17 signatures18 process19 signatures20 195 Sets debug register (to hijack the execution of another thread) 66->195 197 Modifies the context of a thread in another process (thread injection) 66->197 71 svchost.exe 66->71         started        process21 dnsIp22 173 167.179.89.78 AS-CHOOPAUS United States 71->173 211 Query firmware table information (likely to detect VMs) 71->211 signatures23
Threat name:
Win32.Trojan.Fabookie
Status:
Malicious
First seen:
2021-03-31 22:28:10 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:smokeloader family:vidar backdoor discovery dropper loader persistence spyware stealer trojan upx vmprotect
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Program crash
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
VMProtect packed file
Glupteba
Glupteba Payload
MetaSploit
SmokeLoader
Vidar
Malware Config
C2 Extraction:
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Unpacked files
SH256 hash:
e0261252944e6eb739d57389c5bb95c4a56c56be66a541cadb336186407cea9e
MD5 hash:
6e15aac7364b0bf033297d0b0971e204
SHA1 hash:
9fe1f9bcd93c9161f922a22211e3da2469111789
SH256 hash:
76eba818362281f32c419d488de25c691e553349d909c77882bd49c1e570835d
MD5 hash:
a506154f64e42aa3bbefec5319893092
SHA1 hash:
4d6b006a5ce5db94f1badc3c0bb233a831db9f44
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
dba96f50e641d24dac2477c1c723bf162a83621af59cef22cb8a9c159c6282c2
MD5 hash:
34a10b48b23104458b13c6c104b75bbf
SHA1 hash:
6ea0f7fb4b064f1840b8d626a3f5a6c2b052da67
SH256 hash:
0a7e8a8ca5abd7a2598c8a04521b0cb5d006bc1fb212c0d94a9de7d7d579ffb8
MD5 hash:
460742790e2c251afc782a62c30d6f98
SHA1 hash:
a040d68ce94f48fa7b1e57f3d96ad76622fd40b7
SH256 hash:
ba477c27dd78bc569122a79de7bf47894221da040b1e65eb63688434fe448ae4
MD5 hash:
ffab7dc9257114988a89581105a50ae2
SHA1 hash:
a2b4d66184405537798494252aed0ac6fb6ad6cc
Detections:
win_vidar_auto
SH256 hash:
417c9b048550ef2a486c998f39e8d60918de839aa03e60bbdbc2cc6c90ba24be
MD5 hash:
d25a051d566dcdf7cbb81f164cfd2cb3
SHA1 hash:
f70eae9b42d540d1da015be50279ceb73ac9977d
SH256 hash:
0b4a049599c50a02c1f76947e45e60704aff257c5c2686164ad44ed5a9db4b78
MD5 hash:
c640d1853d3d32d7146cf77c65b18f43
SHA1 hash:
0b113e0adc0d61c5fbb3145ed2e95b2aebebc8f0
SH256 hash:
3836f3a776081d40e5b94798a031c9faf7c10172ee23263cd2b392cf9f970ea9
MD5 hash:
fcf014ef4370f4d721417b6c57dae4e3
SHA1 hash:
87d2adae2b23de90ef3cafcbd8c5b99e4e52d0bf
SH256 hash:
b1c97218010e6382a7dcbc64ca6a86b2839093be173ed7d693c0c886ae6ef221
MD5 hash:
8c45f62a74a65dd51b52190e6854282e
SHA1 hash:
984e3a0d42486c14a56ea6075bef1f7d1c4fbee4
SH256 hash:
2d9cac8f24a5c6faefc92b8751ca7a33239a0f4178de419eb49ec01c7fd7e430
MD5 hash:
03958a780e8c07745d2fe4a3c74dec2a
SHA1 hash:
d3a91d2233c9635c3cb3e136e1afee6b78d9e3f7
SH256 hash:
13ac8e8350e3ec494ec15a8d141f8cb5a936abbdfc50cf37821c1d0c5c1e3f69
MD5 hash:
6a22f8013e3d7a2a42c406def70ba64c
SHA1 hash:
790cc8b2d93c918a549131fc1795f4e9679f66c1
SH256 hash:
f9e4484e6ffde8f362ea0476ddc7d2cb6a965d0e7775733109f0397fd91bfbf6
MD5 hash:
7c25bd26d658aab435e18270ccf0fa3f
SHA1 hash:
db0926b5d033051899563cd01d106907e3491d38
SH256 hash:
b11bd18587058601cde1be46ec722f2ddc96fddd976f3a263e4d0358e8e08865
MD5 hash:
ad8febdd16bfbb5c4d4730c7b5912e82
SHA1 hash:
3ddeda3f503ed50175c27beb1c1f4b537728f9d9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:IPPort_combo_mem
Author:James_inthe_box
Description:IP and port combo
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe b11bd18587058601cde1be46ec722f2ddc96fddd976f3a263e4d0358e8e08865

(this sample)

  
Delivery method
Distributed via web download

Comments