MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ec606c6695e9c2716c8b3eb6c8b45d085caa03658274366a846ad37c452bd65f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 8


Intelligence 8 IOCs 1 YARA 14 File information Comments 1

SHA256 hash: ec606c6695e9c2716c8b3eb6c8b45d085caa03658274366a846ad37c452bd65f
SHA3-384 hash: 6d453d8d3c71ebbe569d8bb615e05a09a28a0224329e170d8e41fe77f05d3e9e413c88859c2ef9b9395eccaac74008b0
SHA1 hash: 48714e09243222f52fbcee2f9ba2f93f396381bf
MD5 hash: a18b2338e696e78ff21d7fd811a66773
humanhash: floor-fish-edward-oranges
File name:a18b2338e696e78ff21d7fd811a66773.exe
Download: download sample
Signature ArkeiStealer
File size:3'238'835 bytes
First seen:2021-05-23 09:25:46 UTC
Last seen:2021-05-23 10:01:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xRCvLUBsgFSK30AhDkPF5YSZKXHbBv8tZ1Wks6Unvk:x6LUCgFN30AhDVJX58tZ1Wkik
Threatray 8 similar samples on MalwareBazaar
TLSH 62E53320B7F681B2F2A10470D95CBBB1C1FDC3684B2585AF33A1E84DDB7A9556307A5C
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
ArkeiStealer C2:
http://94.130.58.199/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://94.130.58.199/ https://threatfox.abuse.ch/ioc/57564/

Intelligence


File Origin
# of uploads :
2
# of downloads :
163
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a18b2338e696e78ff21d7fd811a66773.exe
Verdict:
No threats detected
Analysis date:
2021-05-23 09:29:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Writes to foreign memory regions
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 421883 Sample: b7j26HFyAZ.exe Startdate: 23/05/2021 Architecture: WINDOWS Score: 100 151 Multi AV Scanner detection for domain / URL 2->151 153 Found malware configuration 2->153 155 Antivirus detection for URL or domain 2->155 157 8 other signatures 2->157 11 b7j26HFyAZ.exe 14 2->11         started        process3 file4 87 C:\Users\user\AppData\...\setup_install.exe, PE32 11->87 dropped 89 C:\Users\user\AppData\Local\...\metina_4.exe, PE32 11->89 dropped 91 C:\Users\user\AppData\Local\...\metina_3.exe, PE32 11->91 dropped 93 9 other files (1 malicious) 11->93 dropped 14 setup_install.exe 1 11->14         started        process5 dnsIp6 145 8.8.8.8 GOOGLEUS United States 14->145 147 104.21.57.186 CLOUDFLARENETUS United States 14->147 149 127.0.0.1 unknown unknown 14->149 191 Detected unpacking (changes PE section rights) 14->191 18 cmd.exe 1 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 8 other processes 14->24 signatures7 process8 process9 26 metina_3.exe 91 18->26         started        31 metina_1.exe 7 20->31         started        33 metina_5.exe 2 22->33         started        35 metina_4.exe 1 24->35         started        37 metina_2.exe 1 24->37         started        39 metina_6.exe 24->39         started        dnsIp10 127 94.130.58.199 HETZNER-ASDE Germany 26->127 129 104.17.63.50 CLOUDFLARENETUS United States 26->129 95 C:\Users\user\AppData\...\softokn3[1].dll, PE32 26->95 dropped 97 C:\Users\user\AppData\...\freebl3[1].dll, PE32 26->97 dropped 99 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 26->99 dropped 111 9 other files (none is malicious) 26->111 dropped 167 Detected unpacking (changes PE section rights) 26->167 169 Detected unpacking (overwrites its own PE header) 26->169 171 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 26->171 181 4 other signatures 26->181 101 C:\Users\user\AppData\Local\...\install.dll, PE32 31->101 dropped 103 C:\Users\user\AppData\...\Qt5Concurrent.dll, PE32+ 31->103 dropped 41 rundll32.exe 31->41         started        105 C:\Users\user\AppData\Local\...\metina_5.tmp, PE32 33->105 dropped 44 metina_5.tmp 33->44         started        131 208.95.112.1 TUT-ASUS United States 35->131 133 88.99.66.31 HETZNER-ASDE Germany 35->133 135 192.168.2.1 unknown unknown 35->135 173 Antivirus detection for dropped file 35->173 175 Machine Learning detection for dropped file 35->175 48 jfiag3g_gg.exe 35->48         started        50 jfiag3g_gg.exe 35->50         started        58 2 other processes 35->58 107 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 37->107 dropped 177 Renames NTDLL to bypass HIPS 37->177 179 Checks if the current machine is a virtual machine (disk enumeration) 37->179 52 explorer.exe 37->52 injected 137 31.13.92.36 FACEBOOKUS Ireland 39->137 139 88.218.92.148 ENZUINC-US Netherlands 39->139 109 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 39->109 dropped 54 jfiag3g_gg.exe 39->54         started        56 jfiag3g_gg.exe 39->56         started        60 2 other processes 39->60 file11 signatures12 process13 dnsIp14 159 Writes to foreign memory regions 41->159 161 Allocates memory in foreign processes 41->161 163 Creates a thread in another existing process (thread injection) 41->163 62 svchost.exe 41->62 injected 65 svchost.exe 41->65 injected 67 svchost.exe 41->67 injected 73 2 other processes 41->73 143 198.54.126.101 NAMECHEAP-NETUS United States 44->143 113 C:\Users\user\AppData\...\____aRnOU__B_a_.exe, PE32 44->113 dropped 115 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 44->115 dropped 117 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 44->117 dropped 119 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 44->119 dropped 69 ____aRnOU__B_a_.exe 44->69         started        165 Tries to harvest and steal browser information (history, passwords, etc) 48->165 file15 signatures16 process17 dnsIp18 185 Sets debug register (to hijack the execution of another thread) 62->185 187 Modifies the context of a thread in another process (thread injection) 62->187 75 svchost.exe 62->75         started        121 199.188.201.83 NAMECHEAP-NETUS United States 69->121 123 2.20.143.16 AKAMAI-ASN1EU European Union 69->123 125 2 other IPs or domains 69->125 79 C:\Users\user\AppData\...\Xaegomujuno.exe, PE32 69->79 dropped 81 C:\Users\user\AppData\...\Wesysaefihu.exe, PE32 69->81 dropped 83 C:\Program Files (x86)\...83aevakulovy.exe, PE32 69->83 dropped 85 4 other files (3 malicious) 69->85 dropped 189 Detected unpacking (overwrites its own PE header) 69->189 file19 signatures20 process21 dnsIp22 141 198.13.62.186 AS-CHOOPAUS United States 75->141 183 Query firmware table information (likely to detect VMs) 75->183 signatures23
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-05-20 15:27:54 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader family:tofsee family:vidar aspackv2 backdoor discovery evasion infostealer persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads local data of messenger clients
Reads user/profile data of web browsers
ASPack v2.12-2.42
Creates new service(s)
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Modifies Windows Firewall
UPX packed file
Checks for common network interception software
Tofsee
Vidar
PlugX
RedLine
SmokeLoader
Malware Config
C2 Extraction:
http://khaleelahmed.com/upload/
http://twvickiassociation.com/upload/
http://www20833.com/upload/
http://cocinasintonterias.com/upload/
http://masaofukunaga.com/upload/
http://gnckids.com/upload/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_HyperPro03
Author:ditekSHen
Description:Hunt HyperPro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-23 09:59:40 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
2) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
3) [C0046] File System Micro-objective::Create Directory
4) [C0048] File System Micro-objective::Delete Directory
5) [C0047] File System Micro-objective::Delete File
6) [C0049] File System Micro-objective::Get File Attributes
7) [C0051] File System Micro-objective::Read File
8) [C0050] File System Micro-objective::Set File Attributes
9) [C0052] File System Micro-objective::Writes File
10) [C0017] Process Micro-objective::Create Process
11) [C0038] Process Micro-objective::Create Thread