General

  • Target

    wave_bypass.exe

  • Size

    25.6MB

  • Sample

    240812-flwkjswflr

  • MD5

    bb86d90e6f8a455a3de78ab876f915d1

  • SHA1

    6e216c2c17c066831c3a663d2c194cccc8799795

  • SHA256

    3251be108d2d1034710276af57fa4dd96692cd3cf9f0b3e9045528a4f32cb775

  • SHA512

    2be3bf5270a7a8516af9f3836eb82f5b74b82da52be581cf122f4d3f35bebee32c0782001f3e4475452f3f47c140cd8dd3f355be24d59cf50fb98049d6f8e757

  • SSDEEP

    393216:HitBxmzN05GC7NSSjMKKBe7gpEgc/s0WVGwGAd4G+JH5GE5p3BmGHgsh+SwlcxV1:mBFjxjHgrZjzdKHcEtb7MJt8r

Malware Config

Targets

    • Target

      wave_bypass.exe

    • Size

      25.6MB

    • MD5

      bb86d90e6f8a455a3de78ab876f915d1

    • SHA1

      6e216c2c17c066831c3a663d2c194cccc8799795

    • SHA256

      3251be108d2d1034710276af57fa4dd96692cd3cf9f0b3e9045528a4f32cb775

    • SHA512

      2be3bf5270a7a8516af9f3836eb82f5b74b82da52be581cf122f4d3f35bebee32c0782001f3e4475452f3f47c140cd8dd3f355be24d59cf50fb98049d6f8e757

    • SSDEEP

      393216:HitBxmzN05GC7NSSjMKKBe7gpEgc/s0WVGwGAd4G+JH5GE5p3BmGHgsh+SwlcxV1:mBFjxjHgrZjzdKHcEtb7MJt8r

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks