General

  • Target

    Wasper Setup.rar

  • Size

    52.5MB

  • Sample

    240804-mrbkwstbqp

  • MD5

    1c2c251ede9e57d7a0989c909ce5c1b7

  • SHA1

    222b453ae3035198a28ae97eb465e5a7d4e0bf7f

  • SHA256

    34d49930f1d8677a454ffa94b73ecc9d849a449fef1f962ab9c016a9f692c9b7

  • SHA512

    ce941a17c413ff38b99f44890495de792bfdac4cbe6fa2fae92aebcf72e247408ffd5cd470643265d736a1458f148753f749253aca99a2234599c8890787feee

  • SSDEEP

    1572864:f6C8U2BYzj3o1tC5OilVfYkxA+5v0eQX80g45Gq:fybe3/+39

Malware Config

Extracted

Family

stealc

Botnet

wasp2

C2

http://45.152.112.103

Attributes
  • url_path

    /1cf3aa1810feeb67.php

Targets

    • Target

      Wasper Setup/WasperApp.exe

    • Size

      305KB

    • MD5

      7ca72d437db41745f139d1228b8d95e1

    • SHA1

      810a931dec45e63d8d24448d44b1bb645a71047c

    • SHA256

      dbb99b36387720cd0b997359da33ecdaab55cb68cf9643b34d9d6bc136a3805b

    • SHA512

      9e3e10ac4b96191cbde207b69d0c0412fe4f312da59359b66807e319d0529c9851213d7ea2ffab6346343bf59dfe4288754e97d2b76b79f6171361dd4bd083e8

    • SSDEEP

      3072:KefQZKfOC31VwyY9egNtfNjJvjmqqF7Hb/LMm5M4Dfq8TDZ:KDewyY9egLRePYm5re8T

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks