General

  • Target

    Wave.exe

  • Size

    6.0MB

  • Sample

    241019-qyx91syfjb

  • MD5

    982565bc2a84320f9c1d8f1acceb8483

  • SHA1

    5dafdd8eacf1ddd854393ff81cbb39596fb7c043

  • SHA256

    714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64

  • SHA512

    ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005

  • SSDEEP

    196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx

Malware Config

Targets

    • Target

      Wave.exe

    • Size

      6.0MB

    • MD5

      982565bc2a84320f9c1d8f1acceb8483

    • SHA1

      5dafdd8eacf1ddd854393ff81cbb39596fb7c043

    • SHA256

      714a85f2c7cb1f31f7df9b9042755a9f59b077a3f855a74e0a9786065f1b6b64

    • SHA512

      ee32a8412d38801a64cec7c7f2249e03eac5a34c051ce30b38156426bf7e72663e3c0ec219e9b6464746609aed8df1b36eaedbd831097df30a663316873c7005

    • SSDEEP

      196608:gHFELueN/FJMIDJf0gsAGK4R3nAKubtN2:3x/Fqyf0gst3AKx

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      3P�դ�q.pyc

    • Size

      857B

    • MD5

      1dbbf7dde6b1255524619d38cf4bfd40

    • SHA1

      281a6cbe64e260570a2ce7775f0a9127b84731ac

    • SHA256

      256905e455c00ac4ee08d9950bda264a00818ac2b88a855d19ad5c0c214cd9d9

    • SHA512

      3ae9d72428fbb69c6a789a58a6e2d2d4cead84e8ad5dec39d32137a1dc454d1372ba42f430be2867a52fa5c598b2b9ac1d9a3c6e2e239edbf2df7f796d0ead9c

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks