General
-
Target
wireguard-pro.exe
-
Size
722KB
-
Sample
231003-zckapshd28
-
MD5
c3fdabfa7e016aa9b2cacbb5fc9860a8
-
SHA1
70e5f0dfb1a1dc4d6668f6333ecbf83aa49d13bf
-
SHA256
313897bcfd2d0d82e6f41eef6161976f84c602ebed626ee29feaec6ee36f2c94
-
SHA512
27a44617e0df5faa6051a968151206373b2d961c647c9bf2ac3888308e92b2a2d78511648b6a70b72602a69794f4234ad23c79c5b338061763faaf96987d1562
-
SSDEEP
12288:tNTeVyTF63SThrGvvmfjje59IUwnZH0h:PB43SThy07
Static task
static1
Behavioral task
behavioral1
Sample
wireguard-pro.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
wireguard-pro.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
wireguard-pro.exe
-
Size
722KB
-
MD5
c3fdabfa7e016aa9b2cacbb5fc9860a8
-
SHA1
70e5f0dfb1a1dc4d6668f6333ecbf83aa49d13bf
-
SHA256
313897bcfd2d0d82e6f41eef6161976f84c602ebed626ee29feaec6ee36f2c94
-
SHA512
27a44617e0df5faa6051a968151206373b2d961c647c9bf2ac3888308e92b2a2d78511648b6a70b72602a69794f4234ad23c79c5b338061763faaf96987d1562
-
SSDEEP
12288:tNTeVyTF63SThrGvvmfjje59IUwnZH0h:PB43SThy07
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1