MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bcfa6e6fb8a5b32e164fd8a7b49d448e65482fae38fe17e48cc35cb6427a360e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 15 File information Comments

SHA256 hash: bcfa6e6fb8a5b32e164fd8a7b49d448e65482fae38fe17e48cc35cb6427a360e
SHA3-384 hash: a9c47de4284abc5ff28a70b39aca9c4497259da5b3cd8fef20c8bf39c14664894e18cabddaa3734b708191f585d9a441
SHA1 hash: 52c930ed813c9d7a592e1bb2e912c20dcf063bf2
MD5 hash: a82b499dee9c2863b1f9991585e12291
humanhash: sink-sierra-network-orange
File name:a82b499dee9c2863b1f9991585e12291.exe
Download: download sample
Signature ArkeiStealer
File size:6'604'839 bytes
First seen:2021-12-25 21:21:13 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 196608:xxqyLiLS7gVUziDNIdVu/b6bEeKToIWnkMG8UhrLS+e:xfoS7gMiDNIK6bEerfkMGnhrG+e
Threatray 1'831 similar samples on MalwareBazaar
TLSH T195663327B7E220FACE1781311A0C6976E6F7D3CC0952887B2265E66C5E7DB2F11B44C9
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:ArkeiStealer exe gcleaner


Avatar
abuse_ch
GCleaner C2:
94.140.115.160:81

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
94.140.115.160:81 https://threatfox.abuse.ch/ioc/287669/

Intelligence


File Origin
# of uploads :
1
# of downloads :
371
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bcfa6e6fb8a5b32e164fd8a7b49d448e65482fae38fe17e48cc35cb6427a360e.exe
Verdict:
Malicious activity
Analysis date:
2021-12-26 00:44:31 UTC
Tags:
trojan evasion stealer vidar loader rat redline opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Using the Windows Management Instrumentation requests
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Powershell Defender Exclusion
Sigma detected: Shell32 DLL Execution in Suspicious Directory
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 545328 Sample: TmLmHVz4jP.exe Startdate: 25/12/2021 Architecture: WINDOWS Score: 100 68 45.140.167.13 THEFIRST-ASRU United Kingdom 2->68 70 52.182.143.212 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->70 72 5 other IPs or domains 2->72 92 Antivirus detection for URL or domain 2->92 94 Antivirus detection for dropped file 2->94 96 Multi AV Scanner detection for dropped file 2->96 98 18 other signatures 2->98 9 TmLmHVz4jP.exe 24 2->9         started        signatures3 process4 file5 42 C:\Users\user\AppData\...\setup_install.exe, PE32 9->42 dropped 44 C:\Users\user\AppData\...\Thu09e1aa1424.exe, PE32 9->44 dropped 46 C:\Users\user\...\Thu09d383b370e81ac13.exe, PE32 9->46 dropped 48 18 other files (6 malicious) 9->48 dropped 12 setup_install.exe 1 9->12         started        process6 dnsIp7 88 104.21.50.158 CLOUDFLARENETUS United States 12->88 90 127.0.0.1 unknown unknown 12->90 124 Adds a directory exclusion to Windows Defender 12->124 126 Disables Windows Defender (via service or powershell) 12->126 16 cmd.exe 12->16         started        18 cmd.exe 12->18         started        20 cmd.exe 1 12->20         started        22 11 other processes 12->22 signatures8 process9 signatures10 25 Thu098e6c1c066.exe 16->25         started        30 Thu09284c81371.exe 18->30         started        32 Thu09280ea08f6.exe 20->32         started        100 Adds a directory exclusion to Windows Defender 22->100 102 Disables Windows Defender (via service or powershell) 22->102 34 Thu090d5088a23.exe 22->34         started        36 Thu09d383b370e81ac13.exe 22->36         started        38 Thu09b4267b2e4.exe 22->38         started        40 6 other processes 22->40 process11 dnsIp12 74 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 25->74 76 103.155.92.143 TWIDC-AS-APTWIDCLimitedHK unknown 25->76 80 15 other IPs or domains 25->80 50 C:\Users\...\QvNELGPaDYGBotd8d0hBJPOl.exe, PE32+ 25->50 dropped 52 C:\Users\...\QJAjbAoeoTqk7ugXQNU2dSfu.exe, PE32 25->52 dropped 54 C:\Users\user\AppData\...\toolspab2[1].exe, PE32 25->54 dropped 64 40 other files (11 malicious) 25->64 dropped 104 Tries to harvest and steal browser information (history, passwords, etc) 25->104 106 Disable Windows Defender real time protection (registry) 25->106 82 2 other IPs or domains 30->82 66 12 other files (none is malicious) 30->66 dropped 108 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 30->108 110 Tries to steal Crypto Currency Wallets 30->110 112 Sample uses process hollowing technique 32->112 114 Injects a PE file into a foreign processes 32->114 116 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 34->116 118 Checks if the current machine is a virtual machine (disk enumeration) 34->118 56 C:\Users\user\...\Thu09d383b370e81ac13.tmp, PE32 36->56 dropped 120 Obfuscated command line found 36->120 84 2 other IPs or domains 38->84 58 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 38->58 dropped 122 Detected unpacking (overwrites its own PE header) 38->122 78 208.95.112.1 TUT-ASUS United States 40->78 86 4 other IPs or domains 40->86 60 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 40->60 dropped 62 C:\Users\user\AppData\Local\Temp62g3Ry.cpl, PE32 40->62 dropped file13 signatures14
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2021-12-24 03:04:00 UTC
File Type:
PE (Exe)
Extracted files:
298
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:socelars family:vidar botnet:915 botnet:media22ns botnet:userv1 aspackv2 discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
159.69.246.184:13127
65.108.69.168:13293
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
Unpacked files
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
5219529e4da6b15cd182e79ced0ffc59422008b26c4c02213fb466960e5f609e
MD5 hash:
32b3c65204c29de9c8163c08a3772f01
SHA1 hash:
cd75c7aacdf55ff4c9502b12595b099aeaf924f2
SH256 hash:
12f682423118581850910cddfb42e2ebb2851e4ec5c346c041f71a1dda51c057
MD5 hash:
029e5130789f584309502d7e23d6b3ec
SHA1 hash:
93f64300d51f9dbd6119c6aa4fdebecb44372758
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
f94a49f7e9098caec29318488c6ee905bcfb2a5bf6e987305e03576b0da5c595
MD5 hash:
294856fef3e5664d6c4ab77bbdd1f4d2
SHA1 hash:
255d454b5dd344ea29e92e0f0f0ba6908790a6a8
SH256 hash:
f6b7fe031a0679be829e2be964f35f2f78cddcf2a51a1b8a35eddb2dedca4e57
MD5 hash:
1a0555b24572a1153e4dd1b228831f69
SHA1 hash:
560c670ce1610902200c1d2cdf2d2b1fd3f7e850
SH256 hash:
0b5df231e4f28a68ae1fbf237507ea0b8520120e17484319afeb6de3a42f7042
MD5 hash:
5adf8760e6203e087e319cf3fc22c54b
SHA1 hash:
17a2d6a6d4f4ec42928bbdc071a95c54e64421d1
SH256 hash:
acb3e46c8494802e4f1463bc4c5a344c9c9693db3689b9ae9e7ffe0af25187e1
MD5 hash:
e812948e19749ebd5cde5e4548a761cf
SHA1 hash:
6e1bf6afe64203f48cf06f558bff3c969c913197
SH256 hash:
5a4bf5ad804475f131f78088a4ecc5adfcc3519a30442cb862773093e14199c1
MD5 hash:
699d6102317797f2061c0afb8acb1222
SHA1 hash:
2b11d2e6a1b65f791a7d5e818de6def775315927
SH256 hash:
653bdfb07af86c64ec60a39391e4d025c0b1fd7128ca9434647df94ea4d90619
MD5 hash:
5377bc10c187b01c94b2b6c837c46b8d
SHA1 hash:
8c7420527514e3e188768f746968f95186e0a7f7
SH256 hash:
28db68b6ceb46e4c85453fca449eaffc24a43d3f02a43e44bb3950e91d228355
MD5 hash:
2ce18829768514651cc5ebc47f38b8dd
SHA1 hash:
38061ef8dacdf602f0bbbc787d87837d43e11753
SH256 hash:
bcfa6e6fb8a5b32e164fd8a7b49d448e65482fae38fe17e48cc35cb6427a360e
MD5 hash:
a82b499dee9c2863b1f9991585e12291
SHA1 hash:
52c930ed813c9d7a592e1bb2e912c20dcf063bf2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments