General
-
Target
Wave.exe
-
Size
6.0MB
-
Sample
241019-q1sgjsyfrc
-
MD5
982565bc2a84320f9c1d8f1acceb8483
-
SHA1
5dafdd8eacf1ddd854393ff81cbb39596fb7c043
-
SHA256
714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64
-
SHA512
ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005
-
SSDEEP
196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx
Behavioral task
behavioral1
Sample
Wave.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Wave.exe
-
Size
6.0MB
-
MD5
982565bc2a84320f9c1d8f1acceb8483
-
SHA1
5dafdd8eacf1ddd854393ff81cbb39596fb7c043
-
SHA256
714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64
-
SHA512
ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005
-
SSDEEP
196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-