MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e0a642286227876154d27e399aab958ab958f2f2e528c4f4593e9d80c64a87c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 9


Maldoc score: 11


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: e0a642286227876154d27e399aab958ab958f2f2e528c4f4593e9d80c64a87c6
SHA3-384 hash: 1483764e7ed01231d3175dffa6326ee0f58e2792d75063f874ec96e7f3f4ba4d889d9eca13159e54dca7b83210cbb61c
SHA1 hash: cb55c01537fc8beea31d5f1728498e0f74f5a865
MD5 hash: cd847a8bcbd819705ed57355fcfd269c
humanhash: mobile-violet-burger-quiet
File name:Invoice- 876543456 Oil_Field_Swift_remmitance.doc
Download: download sample
Signature ArkeiStealer
File size:57'344 bytes
First seen:2021-10-29 05:13:24 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 768:YAcUdkarMdzkx0EHG+Mo66b7Dt5cxJdo8rshTAy:YHikhRuzv6wD/cxHoIC
TLSH T15D438C01BA4AE815F399A0B02EC3C6D9773A7C8D9E92632B32517F5FFC759B04A11706
Reporter abuse_ch
Tags:ArkeiStealer doc

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 11
OLE dump

MalwareBazaar was able to identify 12 sections in this file using oledump:

Section IDSection sizeSection name
1121 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
46454 bytes1Table
527209 bytesData
6414 bytesMacros/PROJECT
765 bytesMacros/PROJECTwm
8964 bytesMacros/VBA/Module1
92066 bytesMacros/VBA/ThisDocument
102660 bytesMacros/VBA/_VBA_PROJECT
11569 bytesMacros/VBA/dir
124096 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
IOCgod.batExecutable file name
SuspiciousOpenMay open a file
SuspiciousCreateTextFileMay create a text file
SuspiciousGetObjectMay get an OLE object with a running instance
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
155
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Document image
Document image
Result
Verdict:
SUSPICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro with File System Write
Detected macro logic that can write data to the file system.
Result
Threat name:
Detection:
malicious
Classification:
expl.evad.troj.spyw
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (creates forbidden files)
Document exploit detected (process start blacklist hit)
Found detection on Joe Sandbox Cloud Basic with higher score
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Sigma detected: Execution from Suspicious Folder
Sigma detected: Microsoft Office Product Spawning Windows Shell
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected Obfuscated Powershell
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 511447 Sample: Invoice- 876543456 Oil_Fiel... Startdate: 29/10/2021 Architecture: WINDOWS Score: 100 47 pinace.ddns.net 2->47 67 Found malware configuration 2->67 69 Yara detected Vidar stealer 2->69 71 Found detection on Joe Sandbox Cloud Basic with higher score 2->71 73 8 other signatures 2->73 12 WINWORD.EXE 35 35 2->12         started        17 WINWORD.EXE 3 9 2->17         started        signatures3 process4 dnsIp5 55 192.168.2.1 unknown unknown 12->55 41 C:\Users\Public\Documents\god.bat, ASCII 12->41 dropped 81 Document exploit detected (creates forbidden files) 12->81 19 cmd.exe 1 12->19         started        file6 signatures7 process8 process9 21 powershell.exe 27 19->21         started        23 conhost.exe 19->23         started        process10 25 gasmonth.exe 15 4 21->25         started        dnsIp11 49 bitbucket.org 104.192.141.1, 443, 49835 AMAZON-02US United States 25->49 51 s3-w.us-east-1.amazonaws.com 52.216.88.211, 443, 49837 AMAZON-02US United States 25->51 53 2 other IPs or domains 25->53 39 C:\Users\user\AppData\Local\...\gasmonth.exe, PE32 25->39 dropped 75 Writes to foreign memory regions 25->75 77 Allocates memory in foreign processes 25->77 79 Injects a PE file into a foreign processes 25->79 30 gasmonth.exe 127 25->30         started        file12 signatures13 process14 dnsIp15 57 136.144.41.229, 49866, 80 WORLDSTREAMNL Netherlands 30->57 43 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 30->43 dropped 45 C:\ProgramData\sqlite3.dll, PE32 30->45 dropped 59 Multi AV Scanner detection for dropped file 30->59 61 Machine Learning detection for dropped file 30->61 63 Tries to harvest and steal browser information (history, passwords, etc) 30->63 65 Tries to steal Crypto Currency Wallets 30->65 35 cmd.exe 30->35         started        file16 signatures17 process18 process19 37 conhost.exe 35->37         started       
Threat name:
Document-Excel.Downloader.Powdow
Status:
Malicious
First seen:
2021-10-29 05:14:09 UTC
AV detection:
15 of 44 (34.09%)
Threat level:
  3/5
Result
Malware family:
Score:
  10/10
Tags:
family:arkei botnet:default macro spyware stealer xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Arkei Stealer Payload
Arkei
Process spawned unexpected child process
Malware Config
C2 Extraction:
http://136.144.41.229/gJCbU1V9y2.php
Dropper Extraction:
http://pinace.ddns.net/w/ConsoleApp11.exe
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments