General
-
Target
AIMWARE_Loader_setup.exe
-
Size
144KB
-
Sample
241112-m6rknatrdq
-
MD5
4354d409b21d4c11707d204e67f640f5
-
SHA1
4c5a70526de5527ae0c2ab089590813ddb2cbae9
-
SHA256
9e8d3fe195a8bcf9433fe687cc5a4679743839b17b6223cb15f96dbc0763eef5
-
SHA512
dac9993f3497ec680a17eb6ccc40d876a5814f3f6f09112079a0521d8fb7c76b2f2b6383314c40f3e92eab847363ad301287c9c789d4500fb5891ab98dc75a81
-
SSDEEP
3072:SFEAbUdAIjonLoL/R6wZ5Oyssuz//C0zrh9L0A:YEACki6fyG60Hh9L
Static task
static1
Behavioral task
behavioral1
Sample
AIMWARE_Loader_setup.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1305582300918185994/EE8PFtpBm_iHizpV_Q_Kn5DP9px4rFVu_tjpCIZQ5EdlmytBIKpakzf4xxE22pXS9U1K
Extracted
xworm
127.0.0.1:4395
19.ip.gl.ply.gg:4395
-
Install_directory
%Public%
-
install_file
Windows Security Host.exe
Targets
-
-
Target
AIMWARE_Loader_setup.exe
-
Size
144KB
-
MD5
4354d409b21d4c11707d204e67f640f5
-
SHA1
4c5a70526de5527ae0c2ab089590813ddb2cbae9
-
SHA256
9e8d3fe195a8bcf9433fe687cc5a4679743839b17b6223cb15f96dbc0763eef5
-
SHA512
dac9993f3497ec680a17eb6ccc40d876a5814f3f6f09112079a0521d8fb7c76b2f2b6383314c40f3e92eab847363ad301287c9c789d4500fb5891ab98dc75a81
-
SSDEEP
3072:SFEAbUdAIjonLoL/R6wZ5Oyssuz//C0zrh9L0A:YEACki6fyG60Hh9L
-
Detect Umbral payload
-
Detect Xworm Payload
-
Umbral family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-