General
-
Target
aquatic.zip
-
Size
33.0MB
-
Sample
250202-q84vjswqal
-
MD5
84bcfcf87857034605867f2ffbf9e4d5
-
SHA1
64d5517098246d906f5412e746767c2179ab5095
-
SHA256
1b3be3019f94a15556df2cbd0448537152b48c812485f4160c8bd508b0d0c651
-
SHA512
9eb89beb719f9222670fd38e3ba3ad27254261e5672b4ef0ab57eeae2e9997eed95b1d7723a8465be4b045c81694103f0a6a8b5fd907dc92cee34470e80201c4
-
SSDEEP
786432:9y7JN0EH8j2ow+j09T+lfw3h90vOi59PDoc:9y705r0N+dw3h9oOi59Psc
Static task
static1
Behavioral task
behavioral1
Sample
aquatic/crack.dll
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
aquatic/loader.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
aquatic/main.exe
Resource
win11-20241007-en
Malware Config
Extracted
xworm
5.0
testarosa.duckdns.org:7110
5ZpeoOe6AtQfr6wU
-
Install_directory
%AppData%
-
install_file
Ondrive.exe
Targets
-
-
Target
aquatic/crack.dll
-
Size
5.1MB
-
MD5
fe7dc4218e47f5c31e7a2db9b2e55ddd
-
SHA1
6d30688097e87755b5d59429e5dfb9ce0562f931
-
SHA256
1cbaa9f954edae2e9a6ccac8e0119ff533ee01b42b1bb24fa10adfa80064b780
-
SHA512
922048e800411cb7f21618647b88b0d8b5c98aa45a55eb8ab66a838f3900bed6e03cd247e27af0b304bd4b71fa6402d1b88aa320aa4c23a42088a1617dac73c7
-
SSDEEP
98304:ZvNYCYPKFV3CIz5igBo6qO90Pqp8YVH/6yG/fdmjLdGGf:ZvyWLNia90S7iyb
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
-
-
Target
aquatic/loader.exe
-
Size
5.2MB
-
MD5
c136329a989aad9543c913f9197a01fe
-
SHA1
0b3bdab50947cf330243938c9ccb3e685c43457b
-
SHA256
9b802ef1b1e58a521a45dbd45c48c75c5b7f9ac53b273d6d2cf868c1f6d46885
-
SHA512
fa7a7efa10b4da760b7d281aa235fa4bb4ce28d12796f28632fd653ae184a6f09bc796c18ba1aa3253f713af0334d97f040dc762a8a1d25352dc7308d49b8590
-
SSDEEP
98304:fKYhdZRJ8os9WXz/DsEAE4SfTQ3+5wJCn9cK4KwrUWxeNVSreDGknLjiSXBI:CYhdo0D/D1J8+mM9Y/gNIsGkLj
-
Detect Umbral payload
-
Detect Xworm Payload
-
Njrat family
-
Umbral family
-
Xworm family
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
aquatic/main.exe
-
Size
24.1MB
-
MD5
c4639a9dd4fa418a1e2e5537b9a53bfe
-
SHA1
9fea0f4615170667aa59dac92f6d424455b5fc54
-
SHA256
6548853e51522d28bc2d4ee6dbecdfe7be496462cb87f26587f830374ce07ec7
-
SHA512
2e5f53a2d4bae0028ecb715485327db9da7aeb45176e7e54db039516dab6002f41b5f44ae728f7752ee840f34b14ac78698cea3bc4cc2d00ea815873bad6b692
-
SSDEEP
786432:8Ljr7FsBzlI0ecXYc1xk/cBFG8zv7NRDZPA:oezlI1kLxJBFGu7HFY
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1