General
-
Target
Wasper Setup.rar
-
Size
52.5MB
-
Sample
240804-mrbkwstbqp
-
MD5
1c2c251ede9e57d7a0989c909ce5c1b7
-
SHA1
222b453ae3035198a28ae97eb465e5a7d4e0bf7f
-
SHA256
34d49930f1d8677a454ffa94b73ecc9d849a449fef1f962ab9c016a9f692c9b7
-
SHA512
ce941a17c413ff38b99f44890495de792bfdac4cbe6fa2fae92aebcf72e247408ffd5cd470643265d736a1458f148753f749253aca99a2234599c8890787feee
-
SSDEEP
1572864:f6C8U2BYzj3o1tC5OilVfYkxA+5v0eQX80g45Gq:fybe3/+39
Static task
static1
Behavioral task
behavioral1
Sample
Wasper Setup/WasperApp.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Wasper Setup/WasperApp.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
wasp2
http://45.152.112.103
-
url_path
/1cf3aa1810feeb67.php
Targets
-
-
Target
Wasper Setup/WasperApp.exe
-
Size
305KB
-
MD5
7ca72d437db41745f139d1228b8d95e1
-
SHA1
810a931dec45e63d8d24448d44b1bb645a71047c
-
SHA256
dbb99b36387720cd0b997359da33ecdaab55cb68cf9643b34d9d6bc136a3805b
-
SHA512
9e3e10ac4b96191cbde207b69d0c0412fe4f312da59359b66807e319d0529c9851213d7ea2ffab6346343bf59dfe4288754e97d2b76b79f6171361dd4bd083e8
-
SSDEEP
3072:KefQZKfOC31VwyY9egNtfNjJvjmqqF7Hb/LMm5M4Dfq8TDZ:KDewyY9egLRePYm5re8T
-
Detects HijackLoader (aka IDAT Loader)
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2