SYMBOLCOMMON_NAMEaka. SYNONYMS
win.arkei_stealer (Back to overview)

Arkei Stealer

aka: ArkeiStealer
URLhaus    

Arkei is a stealer that appeared around May 2018. It collects data about browsers (saved passwords and autofill forms), cryptocurrency wallets, and steal files matching an attacker-defined pattern. It then exfiltrates everything in a zip file uploaded to the attacker's panel. Later, it was forked and used as a base to create Vidar stealer.

References
2022-03-23InfoSec Handlers Diary BlogBrad Duncan
@online{duncan:20220323:arkei:b2a08f5, author = {Brad Duncan}, title = {{Arkei Variants: From Vidar to Mars Stealer}}, date = {2022-03-23}, organization = {InfoSec Handlers Diary Blog}, url = {https://isc.sans.edu/diary/rss/28468}, language = {English}, urldate = {2022-03-25} } Arkei Variants: From Vidar to Mars Stealer
Arkei Stealer Mars Stealer Vidar
2022-02-17BlackberryBlackBerry Research & Intelligence Team
@online{team:20220217:threat:899b90a, author = {BlackBerry Research & Intelligence Team}, title = {{Threat Thursday: Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA}}, date = {2022-02-17}, organization = {Blackberry}, url = {https://blogs.blackberry.com/en/2022/02/threat-thursday-arkei-infostealer}, language = {English}, urldate = {2022-02-26} } Threat Thursday: Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA
Arkei Stealer SmokeLoader
2022-02-12forensicitguyTony Lambert
@online{lambert:20220212:analyzing:cea05eb, author = {Tony Lambert}, title = {{Analyzing a Stealer MSI using msitools}}, date = {2022-02-12}, organization = {forensicitguy}, url = {https://forensicitguy.github.io/analyzing-stealer-msi-using-msitools/}, language = {English}, urldate = {2022-02-14} } Analyzing a Stealer MSI using msitools
Arkei Stealer
2021-11-23Minerva LabsNatalie Zargarov
@online{zargarov:20211123:long:6d3da55, author = {Natalie Zargarov}, title = {{A Long List Of Arkei Stealer's Crypto Browser Wallets}}, date = {2021-11-23}, organization = {Minerva Labs}, url = {https://blog.minerva-labs.com/a-long-list-of-arkei-stealers-browser-crypto-wallets}, language = {English}, urldate = {2022-01-12} } A Long List Of Arkei Stealer's Crypto Browser Wallets
Arkei Stealer
2020-07-30SpamhausSpamhaus Malware Labs
@techreport{labs:20200730:spamhaus:038546d, author = {Spamhaus Malware Labs}, title = {{Spamhaus Botnet Threat Update Q2 2020}}, date = {2020-07-30}, institution = {Spamhaus}, url = {https://www.spamhaus.org/news/images/botnet-report-2020-q2/2020-q2-spamhaus-botnet-threat-report.pdf}, language = {English}, urldate = {2020-07-30} } Spamhaus Botnet Threat Update Q2 2020
AdWind Agent Tesla Arkei Stealer AsyncRAT Ave Maria Azorult DanaBot Emotet IcedID ISFB KPOT Stealer Loki Password Stealer (PWS) Nanocore RAT NetWire RC NjRAT Pony Raccoon RedLine Stealer Remcos Zloader
2018-12-24fumik0 blogfumik0
@online{fumik0:20181224:lets:f7dfc2c, author = {fumik0}, title = {{Let’s dig into Vidar – An Arkei Copycat/Forked Stealer (In-depth analysis)}}, date = {2018-12-24}, organization = {fumik0 blog}, url = {https://fumik0.com/2018/12/24/lets-dig-into-vidar-an-arkei-copycat-forked-stealer-in-depth-analysis/}, language = {English}, urldate = {2022-01-12} } Let’s dig into Vidar – An Arkei Copycat/Forked Stealer (In-depth analysis)
Arkei Stealer Vidar
2018-06-15Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180615:hacker:e0452dd, author = {Catalin Cimpanu}, title = {{Hacker Breaches Syscoin GitHub Account and Poisons Official Client}}, date = {2018-06-15}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/hacker-breaches-syscoin-github-account-and-poisons-official-client/}, language = {English}, urldate = {2019-12-20} } Hacker Breaches Syscoin GitHub Account and Poisons Official Client
Arkei Stealer
Yara Rules
[TLP:WHITE] win_arkei_stealer_auto (20220516 | Detects win.arkei_stealer.)
rule win_arkei_stealer_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.arkei_stealer."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.arkei_stealer"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8d148d28000000 52 56 57 ff15???????? 85c0 }
            // n = 6, score = 400
            //   8d148d28000000       | lea                 edx, [ecx*4 + 0x28]
            //   52                   | push                edx
            //   56                   | push                esi
            //   57                   | push                edi
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax

        $sequence_1 = { 0f84e3feffff 0fb75608 8b45e0 8b4de8 57 56 }
            // n = 6, score = 400
            //   0f84e3feffff         | je                  0xfffffee9
            //   0fb75608             | movzx               edx, word ptr [esi + 8]
            //   8b45e0               | mov                 eax, dword ptr [ebp - 0x20]
            //   8b4de8               | mov                 ecx, dword ptr [ebp - 0x18]
            //   57                   | push                edi
            //   56                   | push                esi

        $sequence_2 = { 8b4614 8d4c020e 33d2 894dee 8955f2 }
            // n = 5, score = 400
            //   8b4614               | mov                 eax, dword ptr [esi + 0x14]
            //   8d4c020e             | lea                 ecx, [edx + eax + 0xe]
            //   33d2                 | xor                 edx, edx
            //   894dee               | mov                 dword ptr [ebp - 0x12], ecx
            //   8955f2               | mov                 dword ptr [ebp - 0xe], edx

        $sequence_3 = { 85c0 0f8458feffff 8b4e20 6a00 8d45e4 50 }
            // n = 6, score = 400
            //   85c0                 | test                eax, eax
            //   0f8458feffff         | je                  0xfffffe5e
            //   8b4e20               | mov                 ecx, dword ptr [esi + 0x20]
            //   6a00                 | push                0
            //   8d45e4               | lea                 eax, [ebp - 0x1c]
            //   50                   | push                eax

        $sequence_4 = { 897ddc ff15???????? 8b1d???????? 6a08 57 }
            // n = 5, score = 400
            //   897ddc               | mov                 dword ptr [ebp - 0x24], edi
            //   ff15????????         |                     
            //   8b1d????????         |                     
            //   6a08                 | push                8
            //   57                   | push                edi

        $sequence_5 = { c70628000000 8b4dc8 894e04 8b55cc 895608 668b45d4 6689460c }
            // n = 7, score = 400
            //   c70628000000         | mov                 dword ptr [esi], 0x28
            //   8b4dc8               | mov                 ecx, dword ptr [ebp - 0x38]
            //   894e04               | mov                 dword ptr [esi + 4], ecx
            //   8b55cc               | mov                 edx, dword ptr [ebp - 0x34]
            //   895608               | mov                 dword ptr [esi + 8], edx
            //   668b45d4             | mov                 ax, word ptr [ebp - 0x2c]
            //   6689460c             | mov                 word ptr [esi + 0xc], ax

        $sequence_6 = { 6a00 51 50 6a00 6a00 ff15???????? 50 }
            // n = 7, score = 400
            //   6a00                 | push                0
            //   51                   | push                ecx
            //   50                   | push                eax
            //   6a00                 | push                0
            //   6a00                 | push                0
            //   ff15????????         |                     
            //   50                   | push                eax

        $sequence_7 = { 33d2 894dee 8955f2 8b4e20 8b16 8d448a0e }
            // n = 6, score = 400
            //   33d2                 | xor                 edx, edx
            //   894dee               | mov                 dword ptr [ebp - 0x12], ecx
            //   8955f2               | mov                 dword ptr [ebp - 0xe], edx
            //   8b4e20               | mov                 ecx, dword ptr [esi + 0x20]
            //   8b16                 | mov                 edx, dword ptr [esi]
            //   8d448a0e             | lea                 eax, [edx + ecx*4 + 0xe]

        $sequence_8 = { 397014 7202 8b00 50 ff15???????? 83f8ff }
            // n = 6, score = 400
            //   397014               | cmp                 dword ptr [eax + 0x14], esi
            //   7202                 | jb                  4
            //   8b00                 | mov                 eax, dword ptr [eax]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   83f8ff               | cmp                 eax, -1

        $sequence_9 = { 6a08 57 8945e8 ffd3 6a0a 57 }
            // n = 6, score = 400
            //   6a08                 | push                8
            //   57                   | push                edi
            //   8945e8               | mov                 dword ptr [ebp - 0x18], eax
            //   ffd3                 | call                ebx
            //   6a0a                 | push                0xa
            //   57                   | push                edi

    condition:
        7 of them and filesize < 1744896
}
[TLP:WHITE] win_arkei_stealer_w0   (20181023 | Arkei Stealer)
rule win_arkei_stealer_w0 {
    meta:
        author = "Fumik0_"
        description = "Arkei Stealer"
        Date = "2018/07/10"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.arkei_stealer"
        malpedia_version = "20181023"
        malpedia_sharing = "TLP:WHITE"
        malpedia_license = ""
 
    strings:
        $s1 = "Arkei" wide ascii
        $s2 = "/server/gate" wide ascii
        $s3 = "/server/grubConfig" wide ascii
        $s4 = "\\files\\" wide ascii
        $s5 = "SQLite" wide ascii
 
    condition:
        all of ($s*)   
}
Download all Yara Rules