General
-
Target
Wave Executor.exe
-
Size
17.7MB
-
Sample
241014-cayzrawaje
-
MD5
866a2c035a75489861d648758f0ece58
-
SHA1
728b360b30c5d0307fd4e7b4b89fec6a15e578ca
-
SHA256
fe969f0222a51b313791225eab33e903a27c1642e930e47f41ff5c7853390d90
-
SHA512
54b754235d50be2227712c7a8c89bc9ff81c963e0a2b88cfdb23b1a8d1b906e29070056532112160e39c02bd89a33e6bdf6e112e2719f96e550a6c5f0f83900e
-
SSDEEP
393216:2qPnLFXlreQpDOETgsvfGavgNt8vEmPg66MLOq:bPLFXNeQoEL2TmGSX
Behavioral task
behavioral1
Sample
Wave Executor.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Wave Executor.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Wave Executor.exe
-
Size
17.7MB
-
MD5
866a2c035a75489861d648758f0ece58
-
SHA1
728b360b30c5d0307fd4e7b4b89fec6a15e578ca
-
SHA256
fe969f0222a51b313791225eab33e903a27c1642e930e47f41ff5c7853390d90
-
SHA512
54b754235d50be2227712c7a8c89bc9ff81c963e0a2b88cfdb23b1a8d1b906e29070056532112160e39c02bd89a33e6bdf6e112e2719f96e550a6c5f0f83900e
-
SSDEEP
393216:2qPnLFXlreQpDOETgsvfGavgNt8vEmPg66MLOq:bPLFXNeQoEL2TmGSX
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1