General

  • Target

    aimzeo.rar

  • Size

    10.8MB

  • Sample

    240915-kacqhsvclk

  • MD5

    fc59373bb2e9fdcf6f4cdcfb14d8c748

  • SHA1

    76dd758c3a08f8400a23de3b292ae64de0654ce1

  • SHA256

    666077e195f036eb926f420dfab5f42f0563fba819f011bbdbaacc7f0940bcd0

  • SHA512

    984060e804aa0cfe3be76cabd1013cca4fbce9c7efc78ccfc6b860be63ab7323df4834b7f282acac627d9781f2b1f3379d224a7de0d576bf2c79843ce351cac5

  • SSDEEP

    196608:OHl4VzXyt7kbCf3G7cGTnXhPIkI3vMTzPp5RRrItzU14czSyv3konFoCdVgiwSk:WOGt7kbp7cyXpS3vGDrJr+o3koAl

Malware Config

Targets

    • Target

      aimzeo/aimzero.exe

    • Size

      11.2MB

    • MD5

      43f94c6ad96fe8c1a4c3091d7c78b14a

    • SHA1

      7d1e6d25731c81ac5a4201055b6d9b18d6a7fe00

    • SHA256

      cb6fca6e05db4834680e50217fa45f420cd0d2877598b5716d0225bffb14d8ea

    • SHA512

      4439fd9fd5a923fe3aa2e892f24831616190958955973c93152535addf339c59ab74f40ed314e4f66778e2ba45fba621444ae3b41cbb9ceb34cb6844bb1912a7

    • SSDEEP

      196608:cAowdmhp4ti5Qv/xF1Qvr2HmGVrXsdfJkhby50MF1b6uXFrf5a:vK2IsxF1GG2da6HFJtf

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      aimzeo/updateoffset.cmd

    • Size

      289B

    • MD5

      14c3896f45f92679adc9d0fce61cd47a

    • SHA1

      9e07ca541cdf5e79ea0951971d2c4319835aba7b

    • SHA256

      7a9d73deac9f5d77da4f1410623713c22f6cd1b63ddfb3d3e1251feb89cd8599

    • SHA512

      dcf65be15759251d693eab4323ff04607e3b8116b2fbc824ba143ce66c048917adafe28884b8467ad51196dd8e3c1e8809f2fa5aec194e13f5c436dd7eacbe94

    Score
    6/10
    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks