Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
55
Global rank
55 infographic chevron month
Month rank
51 infographic chevron week
Week rank
0
IOCs

Arkei is a stealer type malware capable of collecting passwords, autosaved forms, cryptocurrency wallet credentials, and files.

Stealer
Type
ex-USSR
Origin
21 May, 2018
First seen
18 September, 2025
Last seen
Also known as
ArkeiStealer

How to analyze Arkei with ANY.RUN

Type
ex-USSR
Origin
21 May, 2018
First seen
18 September, 2025
Last seen

IOCs

IP addresses
45.84.0.112
103.125.190.248
45.67.229.135
5.252.178.50
146.19.247.187
62.204.41.126
45.67.35.117
104.0.0.0
176.126.113.228
103.0.0.0
Hashes
addec88fabd2fbdd5eb425e3b064cff17a5e083d9e4b4a7aaec43d31e2edc3ba
8fc5c4a8a802b28da1e4649db28cbe3244803f941a067ce286fe279a79d464f8
3dae32e22775721f2f9de5fec79dbcd8d62adaeb057b47c4524e02d130a43b25
ad79e6cc3eed9f54ebf354168ba2328b25b0a9cb73e495488a53882d088c83ff
65287763245fdd8b56bb72298c78fea62405bd35794a06afbbe23cc5d38be90a
518426a718d7e083c2649dbd7b907a419a1bd440327c84bdac350e7ee3c5f0ec
84fcfdfd2e35991c58ef96c71d56da83f6260ea76f9aab61fc33fc96ed0b9c69
95016d1c1c738c940021031a89f35423a08359701f657fba97ed58a8c2d6ea44
57209d876a733376e4ab61850abc4dabee4cbe2570280c3b4634133eef53a616
e4b2784782cceb1203f87cc4386fd69cca9782706a37babb3ae0f38310ec89e6
854a93160d1252773a4159a68beb247a1cf62eaa912030d8221deda4e2b4e685
7abb4b2423a93fa4b7a2cd19bcc854cc96d2e9ed20c13b86c39f49fe7cb80e4a
e6f4f81359a6d6557144e8cb7366a321eaefe746d2d432fc9b1bd86b14b9691f
ba6f5a64ffbc34d1e03a27c5397530dbf5cfab2baf6a7dcf46202aa204d190b8
614543952c73a92e9e6b0adb97e2d0836035c96f8413a1088a3f42ebc7f0a5fa
eec85fa80d61602ba89584f09414487717b8c2518a7213cfab2609b132f95f9c
97002424748e8aaf653cfe94ce5bb976a8444b526738a1418d9ccf3a24aeb4e6
975457ed5ae0174f06cc093d4f9edcf75d88118cbbac5a1e76ad7bc7c679cd58
c1c5f2392d55e5d3250a0b139645fe16bf2ca58bd4f4e9c76445fc7c796c03a9
e2fe66dc2a429aadd2ddbdd0d09e78f7a5ae13ff6f874e36e8f4edee443a892e
Domains
tiny.cc
ip-api.com
mas.to
l3monrat.com
URLs
http://80.92.206.80/
http://5.75.234.140:8333/9dfa7ee730fa2f1efb5ed51dbbec22f5
http://5.75.234.140:8333/
http://5.75.234.140:8333/config.zip
http://5.75.234.140:8333/23024979f5954ed7b86ed774172eb62e
http://5.75.234.140:8333/837dd115ef260ea7afce43e26cba4f62
http://5.75.234.140:8333/d0eb2a9b72a2955c929433e5bfcab136
http://5.75.234.140:8333/e6f100c218428ad878a776e2586defcf
http://116.203.165.188/config.zip
http://116.203.165.188/
http://116.203.165.188/8a317397aaef2adca4fbd91afb9328e7
http://5.75.234.140:8333/2ad8358aa58beeea05cca6adf4e8c87e
http://5.75.234.140:8333/a023df7134b37ad0f51ab8983877c4d3
http://167.235.199.208:8333/
http://167.235.199.208:8333/9dfa7ee730fa2f1efb5ed51dbbec22f5
http://167.235.199.208:8333/config.zip
http://116.202.1.79:9100/
http://116.202.1.79:9100/recent.zip
http://116.202.1.79:9100/3e1b82ea4c6209e2a251c89beae0984f
http://167.235.199.208:8333/8a317397aaef2adca4fbd91afb9328e7
Last Seen at

Recent blog posts

post image
Efficient SOC: How to Detect and Solve Incide...
watchers 293
comments 0
post image
ANY.RUN & Palo Alto Networks Cortex XSOAR...
watchers 418
comments 0
post image
Lazarus Group Attacks in 2025: Here's Everyth...
watchers 2998
comments 0

What is Arkei malware

Arkei is a stealer designed to exfiltrate information from infected systems. Typical for this malware type, it is distributed using Malware-as-a-Service (MaaL) model, which means that anyone can use the malware with minimal technical knowledge — all you need is to purchase access to a control pane from a website that sells the service.

This malware — which is written in C++ — targets Windows systems and is considered a medium impact and medium risk threat.

Having been around since 2018, Arkei has become popular among adversaries: not only is it widely used, but it has spawned several forks including Mars, Oski, and Vidar stealer, which we have covered before in the ANY.RUN trends trackers.

Arkei is capable of retrieving a variety of information from infected machines, including:

  • Form autosaves stored in the browser
  • Login and passwords
  • Files
  • Cryptocurrency wallets

Cryptocurrency owners are at the highest risk and are the main targets of Arkei. It can extract data from around 40 crypto wallet extensions, including MetaMask that accounts for over 80% of web3 wallet usage.

The stealer also targets more than 30 web browsers, including Chrome, Firefox, Microsoft Edge, Opera, Brave, and TOR.

Arkei can also target 2FA extensions, a capability it has had roughly since the beginning of 2022. It's unclear how attackers are planning to use this data, but it's certain that this development could pose new risks for both corporate and private users.

The specific data types that the malware targets depend on its configuration file — a ​​Base64-encoded file with the .PHP extensions — and will vary from campaign to campaign. The attacker can use it to set Arkei's behavior with custom rules, and target specific information.

It is important to note that Arkei terminates execution on machines from the ex-USSR regions.

The stealer identifies the region by accessing the language identifier of the Region Format setting. This behavior is typical for malware originating from the ex-USSR territories, which gives an insight into Arkei’s origin.

Arkei is equipped with multiple evasion techniques that help it avoid detection. For example, it checks that the computer name is not set to ​ “”HAL9TH”” and the username to “”JohnDoe” — these are the default settings of the Windows Defender emulator. It also checks if several DLLs are loaded in a process against a list of antivirus and emulation software.

Once it's time to gather the data, Arkei compiles its findings into a .zip archive, gives it a random 12-character name, and sends it to its control server. In addition to the information specified by the config file, it captures a system screenshot and extracts system information.

How to get more information from Arkei malware

You can obtain Arkei’s malware configurations in the ANY.RUN's sample.

Malware configuration of Arkei stealer Figure 1: Arkei configuration automatically extracted by ANY.RUN

Users can access comprehensive malware configuration data on ANY.RUN interactive online sandbox in as little as 10 seconds after starting the sandbox. There's no need to wait for the emulation to finish running.

Arkei execution process

After a system is infected, a TCP connection is established with the hacker's remote server. The server sends encoded Base64 parameters to the malware, including search path templates and file search masks. Using these parameters, the malware determines which information it needs to steal from the victim's computer.

The malware then requests the libraries necessary for its operation from the remote server. These libraries are sent as ZIP archives.

Subsequent communication with the server involves sending stolen files to the C2 server. Some threat actors use packing techniques on Arkei samples (T1027.002) to avoid detection by signatures. An example of this behavior can be seen in this task we recorded in ANY.RUN.

After launching the packed sample, the AppLaunch.exe process is created in the system, which is part of the .NET Framework. The malicious code is then injected into this process.

Distribution of Arkei

Arkei finds its victims in a number of ways. It’s delivered with malicious email campaigns in infected attachments, distributed through malicious ads, and is sometimes found in cracked software.

Adversaries use trojan horse tactics to entice potential victims into installing Arkei to their systems: social engineering techniques can be utilized, such as offering a free version of a premium software.

Arkei has also been tied to campaigns utilizing SmokeLoader — an advanced modular malware used to gain an initial foothold in the system and drop other executables. Although Smoke Loader, as you probably have guessed from its name, is primarily used as a loader, it can be armed with information stealing functionality itself — double the threat, when used together with Arkei.

Conclusion

Arkei is a that poses a significant risk to users' sensitive data, particularly crypto wallets.

But users can keep their login and password information, files, and 2FA data secure by following these best practices:

  • Avoiding clicking on suspicious links
  • Being vigilant with emails from unknown senders
  • Staying clear from lurid ads
  • Being mindful where they download software from

You can identify and analyze threats like Arkei — and more — in a matter of minutes using ANY.RUN’s interactive sandbox. Sign up for a demo!

HAVE A LOOK AT

Xeno RAT screenshot
Xeno RAT
xenorat
Xeno RAT is an open-source malware mainly distributed through drive-by downloads. The core capabilities of this threat include remote control, keystroke logging, webcam and microphone access. Equipped with advanced utilities, such as Hidden Virtual Network Computing and Socks5 reverse proxy, Xeno RAT is most frequently used in attacks against individual users.
Read More
Latrodectus screenshot
Latrodectus
latrodectus
Latrodectus is a malicious loader that is used by threat actors to gain a foothold on compromised devices and deploy additional malware. It has been associated with the IcedID trojan and has been used by APT groups in targeted attacks. The malware can gather system information, launch executables, and detect sandbox environments. It uses encryption and obfuscation to evade detection and can establish persistence on the infected device.
Read More
Ramnit screenshot
Ramnit
ramnit
Ramnit is a highly modular banking trojan and worm that evolved from a file-infecting virus into a powerful cybercrime tool. It specializes in financial fraud, credential theft, remote access, and malware delivery, being a serious threat to businesses and individuals. First spotted in 2010, Ramnit became popular after the 2014 takedown of the GameOver Zeus botnet, as cybercriminals sought alternatives for banking fraud.
Read More
StrelaStealer screenshot
StrelaStealer
strela
StrelaStealer is a malware that targets email clients to steal login credentials, sending them back to the attacker’s command-and-control server. Since its emergence in 2022, it has been involved in numerous large-scale email campaigns, primarily affecting organizations in the EU and U.S. The malware’s tactics continue to evolve, with attackers frequently changing attachment file formats and updating the DLL payload to evade detection.
Read More
X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More
Play Ransomware screenshot
Play aka PlayCrypt ransomware group has been successfully targeting corporations, municipal entities, and infrastruction all over the world for about three years. It infiltrates networks via software vulnerabilities, phishing links and compromised websites. The ransomware abuses Windows system services to evade detection and maintain persistence. Play encrypts user files and steals sensitive data while demanding a ransom.
Read More