MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f1a553c411aaf180797dd27f75317ed6ab65e166c72845b913273d2bcae4f211. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 15 File information Comments 1

SHA256 hash: f1a553c411aaf180797dd27f75317ed6ab65e166c72845b913273d2bcae4f211
SHA3-384 hash: a65fb8fe61dd41b2c694a1f28d4d39e1e5e319aeeca73024b43791048298a6e3f3b5a2a57bbffe5102609281d042b9a3
SHA1 hash: 283c3333a3b5647edd53b5328d4c798e763db667
MD5 hash: 7e718f4b33409629fbb77bb76cdbc090
humanhash: arkansas-finch-harry-violet
File name:7e718f4b_by_Libranalysis
Download: download sample
Signature ArkeiStealer
File size:3'182'668 bytes
First seen:2021-05-12 14:01:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xYP7fmnBXINTcVni6d+YiuSq5//cec18sOZ1usfNMIG:xqjmn++niqxGq5nWNOZ1usfNxG
TLSH BFE533053FE404FFD75304F4A9CC6BEA98F8E77D1B1588A323604A0D5DF8983962B966
Reporter Libranalysis
Tags:ArkeiStealer


Avatar
Libranalysis
Uploaded as part of the sample sharing project

Intelligence


File Origin
# of uploads :
1
# of downloads :
115
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Sending a UDP request
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 412673 Sample: 7e718f4b_by_Libranalysis Startdate: 12/05/2021 Architecture: WINDOWS Score: 100 158 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->158 160 Multi AV Scanner detection for domain / URL 2->160 162 Found malware configuration 2->162 164 10 other signatures 2->164 11 7e718f4b_by_Libranalysis.exe 15 2->11         started        process3 file4 98 C:\Users\user\AppData\...\setup_install.exe, PE32 11->98 dropped 100 C:\Users\user\AppData\Local\...\metina_6.exe, PE32 11->100 dropped 102 C:\Users\user\AppData\Local\...\metina_5.exe, PE32 11->102 dropped 104 10 other files (3 malicious) 11->104 dropped 14 setup_install.exe 1 11->14         started        process5 dnsIp6 134 estrix.xyz 172.67.165.117, 49725, 80 CLOUDFLARENETUS United States 14->134 136 127.0.0.1 unknown unknown 14->136 210 Detected unpacking (changes PE section rights) 14->210 212 Performs DNS queries to domains with low reputation 14->212 18 cmd.exe 1 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 5 other processes 14->24 signatures7 process8 process9 26 metina_2.exe 1 18->26         started        30 metina_4.exe 15 7 20->30         started        33 metina_1.exe 7 22->33         started        35 metina_3.exe 89 24->35         started        37 metina_6.exe 24->37         started        39 metina_5.exe 24->39         started        41 metina_7.exe 24->41         started        dnsIp10 80 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 26->80 dropped 166 DLL reload attack detected 26->166 168 Detected unpacking (changes PE section rights) 26->168 170 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 26->170 182 4 other signatures 26->182 43 explorer.exe 26->43 injected 138 172.67.145.48 CLOUDFLARENETUS United States 30->138 82 C:\Users\user\AppData\Roaming\4811108.exe, PE32 30->82 dropped 84 C:\Users\user\AppData\Roaming\1391758.exe, PE32 30->84 dropped 86 C:\Users\user\AppData\Roaming\3869277.exe, PE32 30->86 dropped 172 Detected unpacking (overwrites its own PE header) 30->172 48 4811108.exe 30->48         started        50 1391758.exe 30->50         started        52 3869277.exe 30->52         started        88 C:\Users\user\AppData\Local\...\install.dll, PE32 33->88 dropped 90 C:\Users\user\AppData\Local\Temp\libEGL.dll, PE32+ 33->90 dropped 54 rundll32.exe 33->54         started        140 195.201.94.135 HETZNER-ASDE Germany 35->140 142 104.17.62.50 CLOUDFLARENETUS United States 35->142 94 12 other files (none is malicious) 35->94 dropped 174 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 35->174 176 Tries to steal Instant Messenger accounts or passwords 35->176 178 Tries to harvest and steal browser information (history, passwords, etc) 35->178 184 2 other signatures 35->184 56 WerFault.exe 35->56         started        144 88.99.66.31 HETZNER-ASDE Germany 37->144 146 172.67.189.44 CLOUDFLARENETUS United States 37->146 148 ip-api.com 208.95.112.1, 49729, 80 TUT-ASUS United States 39->148 150 3 other IPs or domains 39->150 92 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 39->92 dropped 180 May check the online IP address of the machine 39->180 58 jfiag3g_gg.exe 39->58         started        60 jfiag3g_gg.exe 39->60         started        96 3 other files (none is malicious) 41->96 dropped file11 signatures12 process13 dnsIp14 124 37.120.239.108 SECURE-DATA-ASRO Romania 43->124 126 110.14.121.123 SKB-ASSKBroadbandCoLtdKR Korea Republic of 43->126 130 2 other IPs or domains 43->130 106 C:\Users\user\AppData\Roaming\srjttrr, PE32 43->106 dropped 108 C:\Users\user\AppData\Local\Temp\2371.exe, PE32 43->108 dropped 186 System process connects to network (likely due to code injection or exploit) 43->186 188 Benign windows process drops PE files 43->188 190 Hides that the sample has been downloaded from the Internet (zone.identifier) 43->190 62 haleng.exe 43->62         started        128 104.21.63.235 CLOUDFLARENETUS United States 48->128 110 C:\ProgramData\63\vcruntime140.dll, PE32 48->110 dropped 112 C:\ProgramData\63\sqlite3.dll, PE32 48->112 dropped 114 C:\ProgramData\63\softokn3.dll, PE32 48->114 dropped 120 4 other files (none is malicious) 48->120 dropped 192 Detected unpacking (changes PE section rights) 48->192 194 Detected unpacking (overwrites its own PE header) 48->194 196 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 48->196 198 Tries to harvest and steal browser information (history, passwords, etc) 48->198 200 Injects a PE file into a foreign processes 50->200 116 C:\ProgramData\...\Windows Host.exe, PE32 52->116 dropped 202 Writes to foreign memory regions 54->202 204 Allocates memory in foreign processes 54->204 206 Creates a thread in another existing process (thread injection) 54->206 65 svchost.exe 54->65 injected 68 svchost.exe 54->68 injected 70 svchost.exe 54->70 injected 72 svchost.exe 54->72 injected 118 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 56->118 dropped file15 signatures16 process17 file18 122 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 62->122 dropped 74 jfiag3g_gg.exe 62->74         started        152 System process connects to network (likely due to code injection or exploit) 65->152 154 Sets debug register (to hijack the execution of another thread) 65->154 156 Modifies the context of a thread in another process (thread injection) 65->156 76 svchost.exe 65->76         started        signatures19 process20 dnsIp21 132 facebook.websmails.com 167.179.89.78 AS-CHOOPAUS United States 76->132 208 Query firmware table information (likely to detect VMs) 76->208 signatures22
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-05-06 16:09:17 UTC
AV detection:
22 of 29 (75.86%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader family:vidar aspackv2 backdoor bootkit discovery infostealer persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Writes to the Master Boot Record (MBR)
Loads dropped DLL
Modifies file permissions
Reads local data of messenger clients
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://khaleelahmed.com/upload/
http://twvickiassociation.com/upload/
http://www20833.com/upload/
http://cocinasintonterias.com/upload/
http://masaofukunaga.com/upload/
http://gnckids.com/upload/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_Fabookie
Author:ditekSHen
Description:Detects Fabookie / ElysiumStealer
Rule name:MALWARE_Win_HyperPro03
Author:ditekSHen
Description:Hunt HyperPro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-05-12 15:07:13 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0001.032] Anti-Behavioral Analysis::Timing/Delay Check GetTickCount
1) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
2) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
3) [C0046] File System Micro-objective::Create Directory
4) [C0048] File System Micro-objective::Delete Directory
5) [C0047] File System Micro-objective::Delete File
6) [C0049] File System Micro-objective::Get File Attributes
7) [C0051] File System Micro-objective::Read File
8) [C0050] File System Micro-objective::Set File Attributes
9) [C0052] File System Micro-objective::Writes File
10) [C0017] Process Micro-objective::Create Process
11) [C0038] Process Micro-objective::Create Thread