General
-
Target
WaveBootstrapper.exe
-
Size
1.6MB
-
Sample
240626-y7q63a1hqe
-
MD5
5c2197e8a21917850be6cadf052920c7
-
SHA1
122ae601b16b63fb62f812f86c297dfa54148a7e
-
SHA256
898e45b1f739fb3e3950f489ac6f8b05d4f922e9fc65f2081e7e5e2b3f8c8a37
-
SHA512
bdfdc671440a4adbe35eef054f285e90f9eb5321490cc7e76eb67659cba810eb64c9fe37ca8d5e9ebd5ba909759cfa39051a5ce256ea3d16a1e1400af0c081dc
-
SSDEEP
49152:tcTq24GjdGSiqkqXfd+/9AqYanieKdYZ:t9EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
WaveBootstrapper.exe
Resource
win10-20240404-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1255619070624272456/ZGZ-OocxHDC9mMGPLSk5lS2gJXoyfNX0yD3U6hFdWuKvkEebNO2mVWKrKsYJ8Jf00ATr
Targets
-
-
Target
WaveBootstrapper.exe
-
Size
1.6MB
-
MD5
5c2197e8a21917850be6cadf052920c7
-
SHA1
122ae601b16b63fb62f812f86c297dfa54148a7e
-
SHA256
898e45b1f739fb3e3950f489ac6f8b05d4f922e9fc65f2081e7e5e2b3f8c8a37
-
SHA512
bdfdc671440a4adbe35eef054f285e90f9eb5321490cc7e76eb67659cba810eb64c9fe37ca8d5e9ebd5ba909759cfa39051a5ce256ea3d16a1e1400af0c081dc
-
SSDEEP
49152:tcTq24GjdGSiqkqXfd+/9AqYanieKdYZ:t9EjdGSiqkqXf0FLYW
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-