Resubmissions

27-10-2024 00:56

241027-bavrnazkcx 10

27-10-2024 00:56

241027-baeens1eqd 10

General

  • Target

    Wave-Crack-Installer.exe

  • Size

    25.0MB

  • Sample

    241027-bavrnazkcx

  • MD5

    c3ba35584e6e4f9f35d82ccfc979dcd0

  • SHA1

    9359fbab2a4365902341b8af7946078f33b41965

  • SHA256

    3f11607816cde93d7326ff75abb91ca98e125d347d18307d64924fdeb906d7e4

  • SHA512

    ebbe614aab9f1998e749ce8fb89d8d1d915819abc023464ce3f6114ff9d7542bad15fc6c4b857fca9c76676f65e992162c21b12d26b57cfc516ae8a48458c6e7

  • SSDEEP

    393216:qqPnLFXlrpde9QQbq7oPDOETgs77cGgAVgazpvplpXOuocmYzs8kt8lcs:/PLFXNrQbq7BE7JhNTgKsPy

Malware Config

Targets

    • Target

      Wave-Crack-Installer.exe

    • Size

      25.0MB

    • MD5

      c3ba35584e6e4f9f35d82ccfc979dcd0

    • SHA1

      9359fbab2a4365902341b8af7946078f33b41965

    • SHA256

      3f11607816cde93d7326ff75abb91ca98e125d347d18307d64924fdeb906d7e4

    • SHA512

      ebbe614aab9f1998e749ce8fb89d8d1d915819abc023464ce3f6114ff9d7542bad15fc6c4b857fca9c76676f65e992162c21b12d26b57cfc516ae8a48458c6e7

    • SSDEEP

      393216:qqPnLFXlrpde9QQbq7oPDOETgs77cGgAVgazpvplpXOuocmYzs8kt8lcs:/PLFXNrQbq7BE7JhNTgKsPy

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks