General
-
Target
WaveInstaller.exe
-
Size
229KB
-
Sample
240703-xa2e4asejn
-
MD5
7ca49c1e4deac51030961240dc071e44
-
SHA1
dbe976f4e1ca8476cf35105e214e98c071bdb601
-
SHA256
c4969a3f443dc0c21066c9b801a86d8802585ed708f209cd418d0252541884bd
-
SHA512
cb70825c4cebc592cfe281214f3a614a5a0eac78dac3cc0a5da7116b9d2eb5af718745067c0c7be3b2957c3ddade18416171863490d40c0bec8162e0322303ae
-
SSDEEP
6144:FloZMZrIkd8g+EtXHkv/iD4SpQvDJ6id1IJbGmTuOb8e1mBi:HoZ6L+EP8SpQvDJ6id1IJbGmT5D
Behavioral task
behavioral1
Sample
WaveInstaller.exe
Resource
win7-20240221-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1257990750105239572/oxObyEqK8LZqJLF9958xM8O0ELZTwn2jyxVKBszQf6OpxSVsjZjE1JOm2PnReGiCbZkI
Targets
-
-
Target
WaveInstaller.exe
-
Size
229KB
-
MD5
7ca49c1e4deac51030961240dc071e44
-
SHA1
dbe976f4e1ca8476cf35105e214e98c071bdb601
-
SHA256
c4969a3f443dc0c21066c9b801a86d8802585ed708f209cd418d0252541884bd
-
SHA512
cb70825c4cebc592cfe281214f3a614a5a0eac78dac3cc0a5da7116b9d2eb5af718745067c0c7be3b2957c3ddade18416171863490d40c0bec8162e0322303ae
-
SSDEEP
6144:FloZMZrIkd8g+EtXHkv/iD4SpQvDJ6id1IJbGmTuOb8e1mBi:HoZ6L+EP8SpQvDJ6id1IJbGmT5D
-
Detect Umbral payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-