MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fab31b9c336ced2fe83d81198d3ccfa325ca4d4cab2464b72dcda37f34e2dd68. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ArkeiStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 13 File information Comments 1

SHA256 hash: fab31b9c336ced2fe83d81198d3ccfa325ca4d4cab2464b72dcda37f34e2dd68
SHA3-384 hash: 229f372f76fdddf6818170eecd17f82b4c675ee23fddf80ca75f59342ab2441d4214d121def55af42b8e5c6812a8ee4b
SHA1 hash: 4e671a49e9bff253135414e78b0af1ec8deab01f
MD5 hash: 2271a245c560920e18f0bd4d17c8b531
humanhash: georgia-mockingbird-potato-hotel
File name:2271a245c560920e18f0bd4d17c8b531.exe
Download: download sample
Signature ArkeiStealer
File size:6'800'660 bytes
First seen:2021-04-18 12:23:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c9adc83b45e363b21cd6b11b5da0501f (82 x ArkeiStealer, 60 x RecordBreaker, 46 x RedLineStealer)
ssdeep 196608:itddT4YXjbzV9rzRoITKkV7bYZe/8YN7opjPy:cRzbxJ31tbOeUyoFPy
Threatray 782 similar samples on MalwareBazaar
TLSH FA663376931142F7C0523E348D4BA6FDB577EF4C2F2869EAB3D84C19B86334A112536A
Reporter abuse_ch
Tags:ArkeiStealer exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Delayed reading of the file
Creating a file in the %temp% subdirectories
Creating a file in the Program Files subdirectories
Deleting a recently created file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Creating a file in the Program Files directory
Creating a file in the Windows subdirectories
DNS request
Reading critical registry keys
Sending an HTTP GET request
Sending a custom TCP request
Launching a process
Sending a UDP request
Replacing files
Delayed writing of the file
Enabling the 'hidden' option for recently created files
Running batch commands
Modifying a system file
Sending an HTTP POST request
Creating a file in the system32 subdirectories
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Sending a TCP request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Forced shutdown of a browser
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cyberduck Vidar
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Cyberduck
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 391403 Sample: UAfjgvOViO.exe Startdate: 18/04/2021 Architecture: WINDOWS Score: 100 171 Antivirus detection for dropped file 2->171 173 Multi AV Scanner detection for dropped file 2->173 175 Multi AV Scanner detection for submitted file 2->175 177 11 other signatures 2->177 10 UAfjgvOViO.exe 16 16 2->10         started        13 haleng.exe 2->13         started        process3 file4 103 C:\Program Files (x86)\...\jg7_7wjg.exe, PE32 10->103 dropped 105 C:\Program Files (x86)\...\hjjgaa.exe, PE32 10->105 dropped 107 C:\Program Files (x86)\...\guihuali-game.exe, PE32 10->107 dropped 111 6 other files (4 malicious) 10->111 dropped 15 BarSetpFile.exe 10->15         started        19 RunWW.exe 85 10->19         started        22 guihuali-game.exe 3 9 10->22         started        26 5 other processes 10->26 109 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 13->109 dropped 24 jfiag3g_gg.exe 13->24         started        process5 dnsIp6 159 172.67.189.44 CLOUDFLARENETUS United States 15->159 81 C:\ProgramData\5546786.exe, PE32 15->81 dropped 83 C:\ProgramData\4271953.exe, PE32 15->83 dropped 85 C:\ProgramData\1721085.exe, PE32 15->85 dropped 87 C:\ProgramData\7440706.exe, PE32 15->87 dropped 28 1721085.exe 15->28         started        33 5546786.exe 15->33         started        35 4271953.exe 15->35         started        161 198.98.55.103 PONYNETUS United States 19->161 163 104.17.63.50 CLOUDFLARENETUS United States 19->163 95 12 other files (none is malicious) 19->95 dropped 179 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->179 181 Tries to steal Instant Messenger accounts or passwords 19->181 183 Tries to harvest and steal browser information (history, passwords, etc) 19->183 187 2 other signatures 19->187 37 cmd.exe 19->37         started        97 6 other files (none is malicious) 22->97 dropped 39 wscript.exe 22->39         started        165 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 26->165 167 208.95.112.1 TUT-ASUS United States 26->167 169 6 other IPs or domains 26->169 89 C:\Users\user\Documents\...\jg7_7wjg.exe, PE32 26->89 dropped 91 C:\Users\user\AppData\Local\...\lylal220.tmp, PE32 26->91 dropped 93 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 26->93 dropped 185 Injects a PE file into a foreign processes 26->185 41 LabPicV3.tmp 26->41         started        43 lylal220.tmp 26->43         started        45 jfiag3g_gg.exe 1 26->45         started        47 jfiag3g_gg.exe 26->47         started        file7 signatures8 process9 dnsIp10 153 104.21.46.29 CLOUDFLARENETUS United States 28->153 143 7 other files (none is malicious) 28->143 dropped 199 Antivirus detection for dropped file 28->199 201 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 28->201 203 Machine Learning detection for dropped file 28->203 205 Tries to harvest and steal browser information (history, passwords, etc) 28->205 129 C:\ProgramData\...\Windows Host.exe, PE32 33->129 dropped 207 Detected unpacking (changes PE section rights) 33->207 209 Detected unpacking (overwrites its own PE header) 33->209 211 Creates multiple autostart registry keys 33->211 213 Injects a PE file into a foreign processes 35->213 49 conhost.exe 37->49         started        51 taskkill.exe 37->51         started        53 timeout.exe 37->53         started        55 rundll32.exe 39->55         started        155 199.188.201.83 NAMECHEAP-NETUS United States 41->155 131 C:\Users\user\AppData\...\alpATCHInO.exe, PE32 41->131 dropped 133 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 41->133 dropped 145 2 other files (none is malicious) 41->145 dropped 58 alpATCHInO.exe 41->58         started        135 C:\Users\user\AppData\Local\...\ysAGEL.exe, PE32 43->135 dropped 137 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 43->137 dropped 139 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 43->139 dropped 141 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 43->141 dropped 62 ysAGEL.exe 43->62         started        file11 signatures12 process13 dnsIp14 189 Writes to foreign memory regions 55->189 191 Allocates memory in foreign processes 55->191 193 Creates a thread in another existing process (thread injection) 55->193 64 svchost.exe 55->64 injected 66 svchost.exe 55->66 injected 68 svchost.exe 55->68 injected 75 2 other processes 55->75 147 13.107.4.50 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 58->147 149 162.0.210.44 ACPCA Canada 58->149 113 C:\Program Files (x86)\...\SHaxitapaba.exe, PE32 58->113 dropped 115 C:\...\SHaxitapaba.exe.config, XML 58->115 dropped 117 C:\Users\user\AppData\...\Hajywylesu.exe, PE32 58->117 dropped 125 2 other files (none is malicious) 58->125 dropped 195 Detected unpacking (overwrites its own PE header) 58->195 70 prolab.exe 58->70         started        151 162.0.220.187 ACPCA Canada 62->151 119 C:\Program Files (x86)\...\Qoluqajuvu.exe, PE32 62->119 dropped 121 C:\...\Qoluqajuvu.exe.config, XML 62->121 dropped 123 C:\Users\user\AppData\...\Byqiwylaete.exe, PE32 62->123 dropped 127 2 other files (none is malicious) 62->127 dropped 197 Creates multiple autostart registry keys 62->197 73 irecord.exe 62->73         started        file15 signatures16 process17 file18 77 svchost.exe 64->77         started        99 C:\Users\user\AppData\Local\...\prolab.tmp, PE32 70->99 dropped 101 C:\Users\user\AppData\Local\...\irecord.tmp, PE32 73->101 dropped process19 dnsIp20 157 167.179.89.78 AS-CHOOPAUS United States 77->157 215 Query firmware table information (likely to detect VMs) 77->215 signatures21
Gathering data
Result
Malware family:
Score:
  10/10
Tags:
family:elysiumstealer family:guloader family:oski family:redline family:smokeloader family:vidar agilenet backdoor discovery downloader evasion guloader infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Download via BitsAdmin
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks for any installed AV software in registry
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Obfuscated with Agile.Net obfuscator
Reads local data of messenger clients
Reads user/profile data of web browsers
Windows security modification
Blocklisted process makes network request
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
VMProtect packed file
Checks for common network interception software
Guloader Payload
Nirsoft
ElysiumStealer
Guloader,Cloudeye
Modifies Windows Defender Real-time Protection settings
Oski
RedLine
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Turns off Windows Defender SpyNet reporting
Vidar
Windows security bypass
Malware Config
C2 Extraction:
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
Author:ditekSHen
Description:Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_References_CryptoWallets
Author:ditekSHen
Description:Detects executables referencing many cryptocurrency mining wallets or apps. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
a̵c̵c̸i̵d̷e̵n̷t̴a̷l̴r̵e̷b̸e̴l̸ commented on 2021-04-18 13:14:39 UTC

============================================================
MBC behaviors list (github.com/accidentalrebel/mbcscan):
============================================================
0) [B0009.029] Anti-Behavioral Analysis::Instruction Testing
1) [F0002.002] Collection::Polling
3) [C0027.009] Cryptography Micro-objective::RC4::Encrypt Data
4) [C0021.004] Cryptography Micro-objective::RC4 PRGA::Generate Pseudo-random Sequence
5) [C0032.001] Data Micro-objective::CRC32::Checksum
6) [C0060] Data Micro-objective::Compression Library
7) [C0026.002] Data Micro-objective::XOR::Encode Data
9) [C0046] File System Micro-objective::Create Directory
10) [C0048] File System Micro-objective::Delete Directory
11) [C0047] File System Micro-objective::Delete File
12) [C0049] File System Micro-objective::Get File Attributes
13) [C0051] File System Micro-objective::Read File
14) [C0050] File System Micro-objective::Set File Attributes
15) [C0052] File System Micro-objective::Writes File
16) [C0036.004] Operating System Micro-objective::Create Registry Key::Registry
17) [C0036.003] Operating System Micro-objective::Open Registry Key::Registry
18) [C0036.005] Operating System Micro-objective::Query Registry Key::Registry
19) [C0036.006] Operating System Micro-objective::Query Registry Value::Registry
20) [C0036.001] Operating System Micro-objective::Set Registry Key::Registry
21) [C0017] Process Micro-objective::Create Process
22) [C0041] Process Micro-objective::Set Thread Local Storage Value
23) [C0018] Process Micro-objective::Terminate Process