General
-
Target
aimzeo.rar
-
Size
10.8MB
-
Sample
240915-kacqhsvclk
-
MD5
fc59373bb2e9fdcf6f4cdcfb14d8c748
-
SHA1
76dd758c3a08f8400a23de3b292ae64de0654ce1
-
SHA256
666077e195f036eb926f420dfab5f42f0563fba819f011bbdbaacc7f0940bcd0
-
SHA512
984060e804aa0cfe3be76cabd1013cca4fbce9c7efc78ccfc6b860be63ab7323df4834b7f282acac627d9781f2b1f3379d224a7de0d576bf2c79843ce351cac5
-
SSDEEP
196608:OHl4VzXyt7kbCf3G7cGTnXhPIkI3vMTzPp5RRrItzU14czSyv3konFoCdVgiwSk:WOGt7kbp7cyXpS3vGDrJr+o3koAl
Static task
static1
Behavioral task
behavioral1
Sample
aimzeo/aimzero.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
aimzeo/updateoffset.cmd
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
aimzeo/aimzero.exe
-
Size
11.2MB
-
MD5
43f94c6ad96fe8c1a4c3091d7c78b14a
-
SHA1
7d1e6d25731c81ac5a4201055b6d9b18d6a7fe00
-
SHA256
cb6fca6e05db4834680e50217fa45f420cd0d2877598b5716d0225bffb14d8ea
-
SHA512
4439fd9fd5a923fe3aa2e892f24831616190958955973c93152535addf339c59ab74f40ed314e4f66778e2ba45fba621444ae3b41cbb9ceb34cb6844bb1912a7
-
SSDEEP
196608:cAowdmhp4ti5Qv/xF1Qvr2HmGVrXsdfJkhby50MF1b6uXFrf5a:vK2IsxF1GG2da6HFJtf
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
aimzeo/updateoffset.cmd
-
Size
289B
-
MD5
14c3896f45f92679adc9d0fce61cd47a
-
SHA1
9e07ca541cdf5e79ea0951971d2c4319835aba7b
-
SHA256
7a9d73deac9f5d77da4f1410623713c22f6cd1b63ddfb3d3e1251feb89cd8599
-
SHA512
dcf65be15759251d693eab4323ff04607e3b8116b2fbc824ba143ce66c048917adafe28884b8467ad51196dd8e3c1e8809f2fa5aec194e13f5c436dd7eacbe94
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-