General
-
Target
Wasper Setup.exe
-
Size
51.9MB
-
Sample
240804-h2qqcazanj
-
MD5
a421f09731bc163abba8b85e660499e1
-
SHA1
20dcf24c99b169a9b47c8f390e40508040a259b1
-
SHA256
5f0637ae587d8dde726b69838ada990c771bf8c2a725e57e2a72c2d2165f0806
-
SHA512
4d07fc1b1b441fd566e44f34442230d613e54e5987770aed58e458a3e3e8c64672dfdc58c394fde994f66d359db9b5e16e5d35f1319bf35a22d478762de68e32
-
SSDEEP
1572864:R2eFjiaFO3kVFQXKuhsxCEmGhq3Nb2vBe6OkYiYhol0Yx:LFO93kVFx8sxCEmGU3V1zk8holzx
Static task
static1
Behavioral task
behavioral1
Sample
Wasper Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Wasper Setup.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
wasp2
http://45.152.112.103
-
url_path
/1cf3aa1810feeb67.php
Targets
-
-
Target
Wasper Setup.exe
-
Size
51.9MB
-
MD5
a421f09731bc163abba8b85e660499e1
-
SHA1
20dcf24c99b169a9b47c8f390e40508040a259b1
-
SHA256
5f0637ae587d8dde726b69838ada990c771bf8c2a725e57e2a72c2d2165f0806
-
SHA512
4d07fc1b1b441fd566e44f34442230d613e54e5987770aed58e458a3e3e8c64672dfdc58c394fde994f66d359db9b5e16e5d35f1319bf35a22d478762de68e32
-
SSDEEP
1572864:R2eFjiaFO3kVFQXKuhsxCEmGhq3Nb2vBe6OkYiYhol0Yx:LFO93kVFx8sxCEmGU3V1zk8holzx
-
Detects HijackLoader (aka IDAT Loader)
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2