MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ee5b56341fc871f88e2a32899bb9ad27db349918616db5fe20dd6540ab309a52. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
ArkeiStealer
Vendor detections: 11
| SHA256 hash: | ee5b56341fc871f88e2a32899bb9ad27db349918616db5fe20dd6540ab309a52 |
|---|---|
| SHA3-384 hash: | 6a5be6c0086b02957f98b32c6ee549e4732319825c1f1b42096edb0b90f2b249d036548ab4ee76e67e07d02e5217ba6e |
| SHA1 hash: | 5aed1c050c33e30fcddfa81a4278b7b372e6303d |
| MD5 hash: | 4efa8273a314d4ae643afbb599b23a85 |
| humanhash: | michigan-quiet-cold-minnesota |
| File name: | 4efa8273a314d4ae643afbb599b23a85.exe |
| Download: | download sample |
| Signature | ArkeiStealer |
| File size: | 892'416 bytes |
| First seen: | 2021-06-03 09:56:09 UTC |
| Last seen: | 2021-06-03 10:58:06 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 788842c19811b0f2f6994735b8f363a4 (3 x RedLineStealer, 3 x Stop, 1 x ArkeiStealer) |
| ssdeep | 12288:GPh7zAanyI+8jZJkMT5RFILHdpHusE9WbI46VmQVJ52PtbNF0tRysTgJ8kLVPTKw:G9lnyD258OMOVlJkVbsjkJ8kvb |
| Threatray | 247 similar samples on MalwareBazaar |
| TLSH | 5815F100B7B0C030F5B716B49A7691AF953ABDA17B2451CB22D526EE3635EE0AD31F07 |
| Reporter | |
| Tags: | ArkeiStealer exe |
Intelligence
File Origin
# of uploads :
2
# of downloads :
164
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4efa8273a314d4ae643afbb599b23a85.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-03 09:58:11 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
STOP
Result
Verdict:
Malware
Maliciousness:
Behaviour
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Creating a file
Launching a process
Creating a process with a hidden window
Adding an access-denied ACE
Deleting a recently created file
Creating a process from a recently created file
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Djvu
Detection:
malicious
Classification:
rans.evad
Score:
100 / 100
Signature
Contains functionality to inject code into remote processes
Found ransom note / readme
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Djvu Ransomware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-06-03 08:01:53 UTC
File Type:
PE (Exe)
Extracted files:
46
AV detection:
26 of 47 (55.32%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 237 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
discovery evasion persistence
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Loads dropped DLL
Modifies file permissions
Disables Task Manager via registry modification
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Deletes Windows Defender Definitions
Unpacked files
SH256 hash:
41e56b8b94805135b173db7320c41de1ee40d5ae3916ae6ca5e97bdf3a933daa
MD5 hash:
c7a3e9c8a8d0f7597ce60fb5fdf50eb5
SHA1 hash:
24f034d6535e4027b11f056609129742b8e846e9
Detections:
win_stop_auto
Parent samples :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 hash:
ee5b56341fc871f88e2a32899bb9ad27db349918616db5fe20dd6540ab309a52
MD5 hash:
4efa8273a314d4ae643afbb599b23a85
SHA1 hash:
5aed1c050c33e30fcddfa81a4278b7b372e6303d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.