Overview
overview
10Static
static
10aiosetup-main/Aio.bat
windows11-21h2-x64
10aiosetup-main/EXM.exe
windows11-21h2-x64
1aiosetup-m...on.cmd
windows11-21h2-x64
4aiosetup-main/aio.ps1
windows11-21h2-x64
10aiosetup-m...t2.exe
windows11-21h2-x64
7aiosetup-m...t3.exe
windows11-21h2-x64
7aiosetup-m...t4.exe
windows11-21h2-x64
6aiosetup-m...t5.exe
windows11-21h2-x64
7aiosetup-m...t6.exe
windows11-21h2-x64
7aiosetup-m...t7.msi
windows11-21h2-x64
6aiosetup-m...t8.exe
windows11-21h2-x64
7aiosetup-m...t9.exe
windows11-21h2-x64
7General
-
Target
aiosetup-main.zip
-
Size
46.3MB
-
Sample
241117-zdt7assngr
-
MD5
18ee73828f04ecdcc8d686ef26cbf99a
-
SHA1
3c11e0ba5ee79860ece1743b452bd804d3692379
-
SHA256
df70f699036a080b6e48795b3e940377b4abf8e3869c30c5c102c1dffcef4045
-
SHA512
b804e65d85ef00ff0b39dd07f453eec88907c45f1ed0bcf62698548b3f79cde3cb113d7e66ec0d33476880ba68568cbf975a10e74509d9fd3ed238211ca0a70a
-
SSDEEP
786432:OmnYTFjhvhzajCtC7j3ZSUWIcqkUJpRvxu3kPR7XWudllYPMMvrf29jTrCy10X0M:LyFjhvhzaOtC7jwbGTJpRvxu0PBX5qyK
Static task
static1
Behavioral task
behavioral1
Sample
aiosetup-main/Aio.bat
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
aiosetup-main/EXM.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
aiosetup-main/HWID_Activation.cmd
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
aiosetup-main/aio.ps1
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
aiosetup-main/rdst2.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
aiosetup-main/rdst3.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
aiosetup-main/rdst4.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
aiosetup-main/rdst5.exe
Resource
win11-20241023-en
Behavioral task
behavioral9
Sample
aiosetup-main/rdst6.exe
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
aiosetup-main/rdst7.msi
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
aiosetup-main/rdst8.exe
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
aiosetup-main/rdst9.exe
Resource
win11-20241007-en
Malware Config
Extracted
https://github.com/Gelaxiz/aiosetup/releases/download/app/AioSetup.bat
Extracted
https://github.com/Gelaxiz/aiosetup/releases/download/app/AioSetup.bat
Extracted
https://download.visualstudio.microsoft.com/download/pr/f6b6c5dc-e02d-4738-9559-296e938dabcb/b66d365729359df8e8ea131197715076/windowsdesktop-runtime-6.0.36
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst2.exedownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst3.exedownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst4.exedownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst5.exedownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst6.exedownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst7.msidownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst8.exedownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/rdst9.exedownload
Extracted
https://launcher-public-service-prod06.ol.epicgames.com/launcher/api/installer/download/EpicGamesLauncherInstaller.msi
Extracted
https://github.com/henrypp/memreduct/releases/download/v.3.4/memreduct-3.4
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/HWID_Activation.cmddownload
Extracted
https://github.com/Gelaxiz/aiosetup/raw/refs/heads/main/EXM.exedownload
Targets
-
-
Target
aiosetup-main/Aio.bat
-
Size
317B
-
MD5
9b0795fdfd2e22cba5f76c7c67fa8b32
-
SHA1
ef24c3a06ddbc5af6245675c85fcbd3877637ef3
-
SHA256
031a007dd6876f29abb621afe3b760f6ca37cd0a58e2eabc52f3cae624d66653
-
SHA512
52ad827c6f8b6110e2aa70865e3d40b72837c753e1c0597147f052514442c0dcd23131f6f4fea2f9e99593985f353136470be65d73c32a59150ba7c1ea944840
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
-
-
Target
aiosetup-main/EXM.exe
-
Size
945KB
-
MD5
09d7028997acf3507f20739e0c365b12
-
SHA1
0552df362d8c8406ffd267cb3bcc378a21d00a24
-
SHA256
348451bdc8893691e10bae17dfeeea520248e9b9aaa40cfbeaa2bb6b1b2f0f00
-
SHA512
9aff98d41202bea02dd62fa00e1e795abd515e0a2d1580cd569fd02c027950f977096384459dfbcd0c32e4c032e4bf61df142e2f15d4d0f6b382c5d9013ce76a
-
SSDEEP
24576:XtA4KdTztuUza4IcZ3KdXk22WYJVXvnG/CEvz:kdT8U+4IJXv2WYJ9vngvz
Score1/10 -
-
-
Target
aiosetup-main/HWID_Activation.cmd
-
Size
72KB
-
MD5
b3f7faced48b597184b8aa3d9c748d9a
-
SHA1
33497679e14f387f882e8b28f20104b53f1e725c
-
SHA256
d46e62b38d15acc44bfd745b1c008da26fa7d14d596c8380ae53b783cd9b1a61
-
SHA512
c9db5973634b7e9da3ea2ad7327a582672da66fba7cbfd9bea693296b193672e84bca564ceb4c50060bf979f41613b43b5a2ef27dec42c32238186308dcebf18
-
SSDEEP
1536:+I6R9PRsH4RqxHjEbYRflvdq+vKHFNdmu2/RYITFMGzi0gB0f6s:+I6RdRVR8Rb0FaRYIzOBQ
Score4/10 -
-
-
Target
aiosetup-main/aio.ps1
-
Size
191B
-
MD5
d2b0ff6d78afaea0b3cc0825c2c1f93a
-
SHA1
54388d660c07bac16db6aff131f287ff12bd821e
-
SHA256
81dbcb0ddc1a228c9ec000f5d78a5700fb65d45ce5622db7a3413c85dcd12fb2
-
SHA512
c54c4a5151dd6a6b676b1986cefa80d6709e0d3e7ac1be5541e05b72899c6efb1871293c3d50a1b63a0b1858d1dc47a8e4db11fa7b12fe5110760d75fef893ef
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
-
-
Target
aiosetup-main/rdst2.exe
-
Size
13.7MB
-
MD5
de34b1c517e0463602624bbc8294c08d
-
SHA1
5ce7923ffea712468c05e7ac376dd9c29ea9f6be
-
SHA256
ac96016f1511ae3eb5ec9de04551146fe351b7f97858dcd67163912e2302f5d6
-
SHA512
114bca1ecd17e419ad617a1a4341e607250bcb02626cdc0670eb60be734bbad1f3c84e38f077af9a32a6b1607b8ce6e4b3641c0faefaa779c0fec0d3ac022dac
-
SSDEEP
393216:/d/FlptVYmfr7yBG/4JU4TRjtjUMy4i6kgsY7i:/1PpttD7yBG/QHTJtYMyke9
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
aiosetup-main/rdst3.exe
-
Size
14.3MB
-
MD5
f0248d477e74687c5619ae16498b13d4
-
SHA1
9ed4b091148c9b53f66b3f2c69be7e60e74c486a
-
SHA256
b6c82087a2c443db859fdbeaae7f46244d06c3f2a7f71c35e50358066253de52
-
SHA512
0c373b06ffe84f3e803831e90f22d7d73304e47a47839db614f63399ff1b7fcf33153bf3d23998877c96d2a75e316291a219fdd12358ca48928526284b802591
-
SSDEEP
393216:q5lptVYmfr7yBG/4WoI+j6LTinXKSf0fzTDv8:q7pttD7yBG/uljIinXj0fQ
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
aiosetup-main/rdst4.exe
-
Size
790KB
-
MD5
694f54bd227916b89fc3eb1db53f0685
-
SHA1
21fdc367291bbef14dac27925cae698d3928eead
-
SHA256
b8f39714d41e009f75efb183c37100f2cbabb71784bbd243be881ac5b42d86fd
-
SHA512
55bc0de75a7f27f11eb8f4ee8c9934dfe1acd044d8b7b2151c506bdcbead3ab179df7023f699c9139c77541bbc4b1c0657e93c34a6bc4309b665c6cb7636a7e5
-
SSDEEP
12288:0s1yfEcpPzdv+t4cRIy3ze3SUN0PXGTjiqRy2p3kwzjGHTkV:NwfLrvi4cRIyDe3SUNaXy+WypoGHgV
Score6/10-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
aiosetup-main/rdst5.exe
-
Size
281KB
-
MD5
fd6057b33e15a553ddc5d9873723ce8f
-
SHA1
f90efb623b5abea70af63c470daa8674444fb1df
-
SHA256
111aeddc6a6dbf64b28cb565aa12af9ee3cc0a56ce31e4da0068cf6b474c3288
-
SHA512
d894630c9a4bdb767e9f16d1b701acbdf011e721768ba0dc7a24e6d82a4d062a7ca253b1b334edba38c06187104351203a92c017838bdd9f13905cde30f7d94d
-
SSDEEP
6144:pWK8EGMUjp5cGQ3Mek1B3B9h8Ins3i8AEYBSawz1YSc:JGvjp5cj35kDB9hrs3zARBSaJSc
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
aiosetup-main/rdst6.exe
-
Size
868KB
-
MD5
53406e9988306cbd4537677c5336aba4
-
SHA1
06becadb92a5fcca2529c0b93687c2a0c6d0d610
-
SHA256
fa1afff978325f8818ce3a559d67a58297d9154674de7fd8eb03656d93104425
-
SHA512
4f89da81b5a3800aa16ff33cc4a42dbb17d4c698a5e2983b88c32738decb57e3088a1da444ad0ec0d745c3c6b6b8b9b86d3f19909142f9e51f513748c0274a99
-
SSDEEP
24576:+tW4x8xAxCdUcyezFSjaBHFaNlsqK5/oh6iZf1LUXw/vxNI:d4x8xqCGexm8FCspg0iZf1LUXD
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
aiosetup-main/rdst7.msi
-
Size
6.7MB
-
MD5
97c2eebb30c5a88c68c8f24f37183f1d
-
SHA1
49efdc29f65fc8263c196338552c7009fc96c5de
-
SHA256
e6c41d692ebcba854dad4b1c52bb7ddd05926bad3105595d6596b8bab01c25e7
-
SHA512
c9d1017b274ceb1b4ee624cf7e628787c32a727c64f715fbce1f1ae929d9114f8fe1291e34583cec615619b0128c01206b07efc878e7a5c57b792453f73fd0da
-
SSDEEP
98304:wynfL329J1XswfXO6wiBB+4RZg6aENaCZAU5PMO0MntfERyJGH2YPq/:wYD3C1XXfzH+4cLHU5PM/Mnt+YGlq
Score6/10-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
-
-
Target
aiosetup-main/rdst8.exe
-
Size
5.5MB
-
MD5
630d75210b325a280c3352f879297ed5
-
SHA1
b330b760a8f16d5a31c2dc815627f5eb40861008
-
SHA256
b06546ddc8ca1e3d532f3f2593e88a6f49e81b66a9c2051d58508cc97b6a2023
-
SHA512
b6e107fa34764d336c9b59802c858845df9f8661a1beb41436fd638a044580557921e69883ed32737f853e203f0083358f642f3efe0a80fae7932c5e6137331f
-
SSDEEP
98304:EuLgywiNHBeSLxYK/bxE3q/BlZkWMGPQflVJ/EK1sLyzs2T2Q1mOjq4/:V7wqheSVYK/bua/BlWWnuVhsus8nm+qi
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
aiosetup-main/rdst9.exe
-
Size
4.8MB
-
MD5
b88228d5fef4b6dc019d69d4471f23ec
-
SHA1
372d9c1670343d3fb252209ba210d4dc4d67d358
-
SHA256
8162b2d665ca52884507ede19549e99939ce4ea4a638c537fa653539819138c8
-
SHA512
cdd218d211a687dde519719553748f3fb36d4ac618670986a6dadb4c45b34a9c6262ba7bab243a242f91d867b041721f22330170a74d4d0b2c354aec999dbff8
-
SSDEEP
98304:RuLgywiN1ah6HcG0UJrN7SDgndrHZDMeaNNjt0CKKBgY2r71pZ/APaOR72HgQo0z:I7wq1W6HqULS8djZDTaNNeCKVP5ORsg0
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Installer Packages
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1System Binary Proxy Execution
1Msiexec
1