General

  • Target

    Wave.zip

  • Size

    7.2MB

  • Sample

    250104-gqtgeswkdx

  • MD5

    bbdc5f5610fe4187b812bbd5a5d94010

  • SHA1

    f178cb4cec3d7145c9745f5beeb3537977359ccb

  • SHA256

    f99b23097ecfa45fcfbf36e7d47d9c21fff1f61efca9ffd5c158dd2dad168606

  • SHA512

    07e049131944fc84d054aa0a74b7dcabab7101dacb090e01ba8488f4581e9affd48887d23b727e9766350c96acdb2c689837895959b3797610074ed0e951b6af

  • SSDEEP

    98304:fNUE0JlgNtJPUvAPF2B+HV3Gzj6Z5lqopEvK9A+1DhBD1MfXBbErS2AwhS22nmwF:1mOf+z5opa4A+1NqRbE+QAZJmA3hN2Y

Malware Config

Targets

    • Target

      Wave/CrackedAPI.dll

    • Size

      17KB

    • MD5

      344a860f13a69a7e54dddde2e173b959

    • SHA1

      2fa274e76554ad597eb7d7d3aee64b510f0bab68

    • SHA256

      a146c4caf7a218a89a50d4e4f62c5c3c7e93044eb533ec067e1b2c1beb1caff9

    • SHA512

      95a69181ecef824a1decbbdc297eeb0fcdc9cab946119d5a109324d99d2f2d712a04f71ab1de6c1b56e98bb45126b2c23d2a5d9e27da7480a53303df2e74fe71

    • SSDEEP

      384:L2PLC84oAlrigWtFpW8lZtrhh96yAOqYz3kHWiyyETdsSz5j5bHn:Cj+7WtFpW8Ltr1Pqw3k2iWmSjV

    Score
    3/10
    • Target

      Wave/Wave [CRACKED].exe

    • Size

      25.0MB

    • MD5

      a934c390acf126818372c3b56a460e79

    • SHA1

      8000c37903a04b50fc9113b6faeca90f2ae59a43

    • SHA256

      c3e24e122965d0edc2664961eacb5c455424fb3d8f1df6d4dd6a1c6b9afd6e9b

    • SHA512

      0b07e98dcd162a97b2c11133a3c84fdc092ca679a35b2e21356a2f3ef2b64f6c0c81fe3d3701b3a13dd259df828bb450f9f22fa1eefceb4ad6d76efe67f867c8

    • SSDEEP

      98304:L0G+DjWM8JEE1FwamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEI5:LT+0zeNTfm/pf+xk4dWRimrbW3jmyc

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks