MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea12ac3067417f9ecc1f666318e1f063e8ddc74ef6fb83162ba68c1d6819df21. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: ea12ac3067417f9ecc1f666318e1f063e8ddc74ef6fb83162ba68c1d6819df21
SHA3-384 hash: bc97e8c83a6706af537523f83c96933a443474dfdb2c5244facfe5f01ddba1781fbd1307dd25707b5cd8ba103ce5f92c
SHA1 hash: da0a9831cd4674b70441d259984e67333e786a1c
MD5 hash: 6dc8116e251405d1a7f69f0c732adec6
humanhash: oklahoma-romeo-ceiling-moon
File name:file
Download: download sample
Signature ArkeiStealer
File size:344'576 bytes
First seen:2022-12-28 17:47:16 UTC
Last seen:2022-12-29 07:05:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fb6e1ecfdce764db4b1e699784e95013 (15 x Smoke Loader, 8 x RedLineStealer, 1 x RecordBreaker)
ssdeep 6144:HLjUsW95K5nGbMjsqs/pCk9ybVqzE3JgxRmi3tm:HcsW956nQMjsykUbgzEZuki3tm
TLSH T17D74F10133A0D7EAC0138D75BD2097E0973E7C9D6A61216613567AFFA9FC3998A233D1
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9a9acedecee6eee6 (96 x Smoke Loader, 45 x RedLineStealer, 15 x Amadey)
Reporter andretavare5
Tags:ArkeiStealer exe


Avatar
andretavare5
Sample downloaded from http://45.84.0.83/2825.exe

Intelligence


File Origin
# of uploads :
447
# of downloads :
221
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-12-28 17:49:11 UTC
Tags:
trojan stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Creating a window
Connecting to a non-recommended domain
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Stealing user critical data
Unauthorized injection to a recently created process
Forced shutdown of a system process
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
anti-vm greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Arkei Stealer
Verdict:
Malicious
Result
Threat name:
Vidar, Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
DNS related to crypt mining pools
Encrypted powershell cmdline option found
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the hosts file
Multi AV Scanner detection for dropped file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Self deletion via cmd or bat file
Sigma detected: Schedule system process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 774917 Sample: file.exe Startdate: 28/12/2022 Architecture: WINDOWS Score: 100 85 xmr-eu1.nanopool.org 2->85 87 www.google.com 2->87 89 rentry.co 2->89 107 Malicious sample detected (through community Yara rule) 2->107 109 Antivirus detection for URL or domain 2->109 111 Antivirus detection for dropped file 2->111 113 10 other signatures 2->113 10 file.exe 21 2->10         started        15 cmd.exe 2->15         started        17 RegSvc.exe 2->17         started        19 cmd.exe 2->19         started        signatures3 process4 dnsIp5 99 t.me 149.154.167.99, 443, 49696 TELEGRAMRU United Kingdom 10->99 101 116.203.121.167, 49697, 80 HETZNER-ASDE Germany 10->101 103 45.84.0.83, 49698, 80 ALEXHOSTMD Russian Federation 10->103 81 C:\Users\user\AppData\Local\...\mn1[1].exe, PE32 10->81 dropped 83 C:\ProgramData\64632870603991651726.exe, PE32 10->83 dropped 137 Detected unpacking (changes PE section rights) 10->137 139 Detected unpacking (creates a PE file in dynamic memory) 10->139 141 Detected unpacking (overwrites its own PE header) 10->141 147 4 other signatures 10->147 21 64632870603991651726.exe 15 3 10->21         started        25 cmd.exe 1 10->25         started        27 svhost.exe 15->27         started        29 conhost.exe 15->29         started        31 chcp.com 15->31         started        105 rentry.co 17->105 143 Multi AV Scanner detection for dropped file 17->143 145 Machine Learning detection for dropped file 17->145 33 conhost.exe 19->33         started        35 chcp.com 19->35         started        file6 signatures7 process8 dnsIp9 91 transfer.sh 144.76.136.153, 443, 49699 HETZNER-ASDE Germany 21->91 115 Antivirus detection for dropped file 21->115 117 Multi AV Scanner detection for dropped file 21->117 119 Machine Learning detection for dropped file 21->119 129 3 other signatures 21->129 37 AppLaunch.exe 14 27 21->37         started        121 Encrypted powershell cmdline option found 25->121 123 Uses schtasks.exe or at.exe to add and modify task schedules 25->123 125 Uses powercfg.exe to modify the power settings 25->125 127 Modifies power options to not sleep / hibernate 25->127 42 conhost.exe 25->42         started        44 timeout.exe 1 25->44         started        signatures10 process11 dnsIp12 93 api.telegram.org 149.154.167.220, 443, 49702 TELEGRAMRU United Kingdom 37->93 95 rentry.co 107.189.8.5, 443, 49701, 49707 PONYNETUS United States 37->95 97 3 other IPs or domains 37->97 73 C:\ProgramData\RuntimeBrokerData\svhost.exe, PE32+ 37->73 dropped 75 C:\ProgramData\...\WinRing0x64.sys, PE32+ 37->75 dropped 77 C:\ProgramData\...\RuntimeBroker.exe, PE32 37->77 dropped 79 2 other malicious files 37->79 dropped 131 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 37->131 133 Modifies the hosts file 37->133 135 Sample is not signed and drops a device driver 37->135 46 cmd.exe 37->46         started        49 cmd.exe 1 37->49         started        51 cmd.exe 37->51         started        53 13 other processes 37->53 file13 signatures14 process15 signatures16 149 Modifies power options to not sleep / hibernate 46->149 69 7 other processes 46->69 151 Encrypted powershell cmdline option found 49->151 55 powershell.exe 5 49->55         started        57 conhost.exe 49->57         started        59 conhost.exe 51->59         started        61 schtasks.exe 51->61         started        63 conhost.exe 53->63         started        65 schtasks.exe 53->65         started        67 conhost.exe 53->67         started        71 23 other processes 53->71 process17
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2022-12-28 17:48:09 UTC
File Type:
PE (Exe)
Extracted files:
58
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:24 discovery spyware stealer
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Vidar
Malware Config
C2 Extraction:
https://t.me/robloxblackl
https://steamcommunity.com/profiles/76561199458928097
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
8cf72857269772f4b98395910e6743549604d108b2fa574ff8f180d3183e3daa
MD5 hash:
8c7ce76251bbc932947751a714678ab8
SHA1 hash:
1f49df9e18ce1f1195049c1913fc6b1ae86ae722
SH256 hash:
ea12ac3067417f9ecc1f666318e1f063e8ddc74ef6fb83162ba68c1d6819df21
MD5 hash:
6dc8116e251405d1a7f69f0c732adec6
SHA1 hash:
da0a9831cd4674b70441d259984e67333e786a1c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Telegram_Links
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments