MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eef99ba9da50d0f9899f4944a11b98eb898ca444fadf69340f8bcc161abaa391. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: eef99ba9da50d0f9899f4944a11b98eb898ca444fadf69340f8bcc161abaa391
SHA3-384 hash: 13dafa5f9e220c1acfc70551bcd2139d91f48f15cafabf9671479eb88c401c004fcf6c9af4523bfc0303f9413fbf251f
SHA1 hash: 2d9d8f2d580c7e6fa55859152d899496df1b0923
MD5 hash: 1abb60bfdafbb470f5b952d3b3eb7696
humanhash: massachusetts-spring-nitrogen-social
File name:1abb60bfdafbb470f5b952d3b3eb7696.exe
Download: download sample
Signature ArkeiStealer
File size:272'384 bytes
First seen:2022-01-31 07:31:54 UTC
Last seen:2022-01-31 10:04:53 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9422d8f1b75bb5b0336087bbf87775ee (2 x ArkeiStealer, 1 x RedLineStealer, 1 x DarkWatchman)
ssdeep 3072:BXQeCP5ZMsnIjaeg5eIZWChgpq+y5D5JvNF733oW6Bld1KWuvZCVggjcGkNIVqI:BXjCPtOlX+JvNF7HKN1KWqZa7ITsq
Threatray 3'865 similar samples on MalwareBazaar
TLSH T1D344D0C07790C07EC08236B48826FFA15B3AFC32D961DA4777795B2E9E352D16A2B315
File icon (PE):PE icon
dhash icon fcfc94b4b494d9c9 (1 x ArkeiStealer)
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
180
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1abb60bfdafbb470f5b952d3b3eb7696.exe
Verdict:
Malicious activity
Analysis date:
2022-01-31 08:24:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Changing a file
Creating a file in the %AppData% subdirectories
Creating a window
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Stealing user critical data
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CPUID_Instruction
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
exploit greyware qbot
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-01-31 07:32:09 UTC
File Type:
PE (Exe)
Extracted files:
29
AV detection:
22 of 27 (81.48%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:arkei botnet:default discovery spyware stealer suricata
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Arkei Stealer Payload
Arkei
suricata: ET MALWARE Win32/Vidar Variant Stealer CnC Exfil
Malware Config
C2 Extraction:
http://coin-file-file-19.com/tratata.php
Unpacked files
SH256 hash:
69ba4e2995d6b11bb319d7373d150560ea295c02773fe5aa9c729bfd2c334e1e
MD5 hash:
58922177676773ec3324c33734ae9ef9
SHA1 hash:
ce0a3cae8ee18c6d1f22361224b3692d61d5d7a2
SH256 hash:
eef99ba9da50d0f9899f4944a11b98eb898ca444fadf69340f8bcc161abaa391
MD5 hash:
1abb60bfdafbb470f5b952d3b3eb7696
SHA1 hash:
2d9d8f2d580c7e6fa55859152d899496df1b0923
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ArkeiStealer

Executable exe eef99ba9da50d0f9899f4944a11b98eb898ca444fadf69340f8bcc161abaa391

(this sample)

  
Delivery method
Distributed via web download

Comments