MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b3fb5417f369f276a7db43531dabc38241f6fb329bcec6b26f1d9ccd1f817c22. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: b3fb5417f369f276a7db43531dabc38241f6fb329bcec6b26f1d9ccd1f817c22
SHA3-384 hash: 21740b23850399facd25b167795a3c8f50b76f7d93a0906c2670269556f6cbe046603b9117f094973a774beade047e09
SHA1 hash: a26e8d1130da96e4719989f693305bd0096b77fa
MD5 hash: de57ece65f33390aef34432f750236c9
humanhash: beryllium-nine-hotel-twenty
File name:b3fb5417f369f276a7db43531dabc38241f6fb329bcec.exe
Download: download sample
Signature ArkeiStealer
File size:5'417'663 bytes
First seen:2022-09-20 07:45:55 UTC
Last seen:2022-09-21 09:31:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6c9b62aae6117060f9867b92d139b95e (9 x ArkeiStealer, 2 x Smoke Loader, 1 x RedLineStealer)
ssdeep 98304:0aURnsjfaRQ2k9Q8xLgSFbZdIYS6AlTku4eH:0znsjfd0SFt+YSzgu4eH
TLSH T1A846B0237389A43EC06B29354427AAE4593B7F61B50ACC4A5BF8798CCF35542AF3650F
TrID 61.8% (.EXE) Inno Setup installer (109740/4/30)
23.4% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
5.9% (.EXE) Win64 Executable (generic) (10523/12/4)
2.5% (.EXE) Win32 Executable (generic) (4505/5/1)
1.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon 4e47090d0d09474e (1 x AgentTesla, 1 x AsyncRAT, 1 x Formbook)
Reporter abuse_ch
Tags:ArkeiStealer dixiel22-top dropped exe


Avatar
abuse_ch
ArkeiStealer C2:
http://45.92.156.110/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://45.92.156.110/ https://threatfox.abuse.ch/ioc/850615/

Intelligence


File Origin
# of uploads :
4
# of downloads :
241
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-09-19 21:55:02 UTC
Tags:
loader evasion trojan stealer raccoon recordbreaker opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Delayed reading of the file
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
LanguageCheck
CheckNumberOfProcessor
CPUID_Instruction
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
cmd.exe fingerprint greyware keylogger mokes overlay regasm.exe rundll32.exe vidar
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 706009 Sample: b3fb5417f369f276a7db43531da... Startdate: 20/09/2022 Architecture: WINDOWS Score: 100 39 Malicious sample detected (through community Yara rule) 2->39 41 Multi AV Scanner detection for submitted file 2->41 43 Yara detected Vidar stealer 2->43 45 Found many strings related to Crypto-Wallets (likely being stolen) 2->45 9 b3fb5417f369f276a7db43531dabc38241f6fb329bcec.exe 11 2->9         started        process3 file4 27 C:\ProgramData\...\windll.exe, PE32 9->27 dropped 12 windll.exe 9->12         started        process5 signatures6 47 Multi AV Scanner detection for dropped file 12->47 49 Detected unpacking (changes PE section rights) 12->49 51 Detected unpacking (overwrites its own PE header) 12->51 53 2 other signatures 12->53 15 windll.exe 17 12->15         started        process7 dnsIp8 29 45.92.156.110, 49707, 80 YISP-ASNL Netherlands 15->29 31 t.me 149.154.167.99, 443, 49706 TELEGRAMRU United Kingdom 15->31 33 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->33 35 Tries to harvest and steal browser information (history, passwords, etc) 15->35 37 Tries to steal Crypto Currency Wallets 15->37 19 cmd.exe 1 15->19         started        signatures9 process10 process11 21 taskkill.exe 1 19->21         started        23 conhost.exe 19->23         started        25 timeout.exe 1 19->25         started       
Threat name:
Win32.Spyware.Vidar
Status:
Suspicious
First seen:
2022-09-19 21:10:06 UTC
File Type:
PE (Exe)
Extracted files:
66
AV detection:
18 of 39 (46.15%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
0aa155f4aba5a4fd2bec7ea814be1bb965b3d6ccca5593229ab65fabf02242d0
MD5 hash:
4a69652855a7ff9da15707a62bbfa255
SHA1 hash:
0ad1f27f5765d96ad350c97ae903f924828ec0c4
SH256 hash:
b3fb5417f369f276a7db43531dabc38241f6fb329bcec6b26f1d9ccd1f817c22
MD5 hash:
de57ece65f33390aef34432f750236c9
SHA1 hash:
a26e8d1130da96e4719989f693305bd0096b77fa
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

ArkeiStealer

Executable exe b3fb5417f369f276a7db43531dabc38241f6fb329bcec6b26f1d9ccd1f817c22

(this sample)

Comments