General

  • Target

    Wave.exe

  • Size

    6.0MB

  • Sample

    241019-q1sgjsyfrc

  • MD5

    982565bc2a84320f9c1d8f1acceb8483

  • SHA1

    5dafdd8eacf1ddd854393ff81cbb39596fb7c043

  • SHA256

    714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64

  • SHA512

    ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005

  • SSDEEP

    196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx

Malware Config

Targets

    • Target

      Wave.exe

    • Size

      6.0MB

    • MD5

      982565bc2a84320f9c1d8f1acceb8483

    • SHA1

      5dafdd8eacf1ddd854393ff81cbb39596fb7c043

    • SHA256

      714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64

    • SHA512

      ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005

    • SSDEEP

      196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks