MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92
SHA3-384 hash: 1aa4bb92b121e5b63d3f012ea9969614bc4d12bc376d5e659c59ddab51c4c6ab7902219b32a14a010e534b2cb34303d0
SHA1 hash: 862b8a7b780760c9cf94687e18a7bdfe860d9765
MD5 hash: eddd811e7f2369a47c664e1a284cf8bd
humanhash: asparagus-spring-fillet-ceiling
File name:igfxsrvc.exe
Download: download sample
Signature ArkeiStealer
File size:1'711'616 bytes
First seen:2020-08-05 09:27:37 UTC
Last seen:2020-08-05 11:55:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'653 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 12288:PskoDFNWz3DHvLPk5Tl8ca05F8lDoEkRCaBEiG5alt81hs6/2bEf9VrCoqEd/v6y:PUYz3z2U05CoEmEaT7o3+oqE4zPyLEw
Threatray 344 similar samples on MalwareBazaar
TLSH 848545837980CA51D025253BD36AC28487E697005AD3D637E87F33EB6E57B7A38098D7
Reporter abuse_ch
Tags:ArkeiStealer exe


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: vcsolutions.net
Sending IP: 193.142.59.163
From: rainton@vcsolutions.net
Subject: Request For Quotation
Attachment: New Purchase Order.xlsm

Unknown payload URL:
http://bestatmedia.com/igfxsrvc.exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
81
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
DNS request
Sending a custom TCP request
Result
Threat name:
Detection:
malicious
Classification:
troj
Score:
52 / 100
Signature
Machine Learning detection for dropped file
Yara detected Oski Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Ransomware.Foreign
Status:
Malicious
First seen:
2020-08-05 09:29:05 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

ArkeiStealer

Executable exe f2e2cb71a06ac2a95a02168fc3d91f160e6e07ca19c5e6d3d708a9a486dd3f92

(this sample)

Comments