General
-
Target
Wave.zip
-
Size
7.2MB
-
Sample
250104-gqtgeswkdx
-
MD5
bbdc5f5610fe4187b812bbd5a5d94010
-
SHA1
f178cb4cec3d7145c9745f5beeb3537977359ccb
-
SHA256
f99b23097ecfa45fcfbf36e7d47d9c21fff1f61efca9ffd5c158dd2dad168606
-
SHA512
07e049131944fc84d054aa0a74b7dcabab7101dacb090e01ba8488f4581e9affd48887d23b727e9766350c96acdb2c689837895959b3797610074ed0e951b6af
-
SSDEEP
98304:fNUE0JlgNtJPUvAPF2B+HV3Gzj6Z5lqopEvK9A+1DhBD1MfXBbErS2AwhS22nmwF:1mOf+z5opa4A+1NqRbE+QAZJmA3hN2Y
Behavioral task
behavioral1
Sample
Wave/CrackedAPI.ps1
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Wave/CrackedAPI.ps1
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Wave/Wave [CRACKED].exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Wave/Wave [CRACKED].exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Wave/CrackedAPI.dll
-
Size
17KB
-
MD5
344a860f13a69a7e54dddde2e173b959
-
SHA1
2fa274e76554ad597eb7d7d3aee64b510f0bab68
-
SHA256
a146c4caf7a218a89a50d4e4f62c5c3c7e93044eb533ec067e1b2c1beb1caff9
-
SHA512
95a69181ecef824a1decbbdc297eeb0fcdc9cab946119d5a109324d99d2f2d712a04f71ab1de6c1b56e98bb45126b2c23d2a5d9e27da7480a53303df2e74fe71
-
SSDEEP
384:L2PLC84oAlrigWtFpW8lZtrhh96yAOqYz3kHWiyyETdsSz5j5bHn:Cj+7WtFpW8Ltr1Pqw3k2iWmSjV
Score3/10 -
-
-
Target
Wave/Wave [CRACKED].exe
-
Size
25.0MB
-
MD5
a934c390acf126818372c3b56a460e79
-
SHA1
8000c37903a04b50fc9113b6faeca90f2ae59a43
-
SHA256
c3e24e122965d0edc2664961eacb5c455424fb3d8f1df6d4dd6a1c6b9afd6e9b
-
SHA512
0b07e98dcd162a97b2c11133a3c84fdc092ca679a35b2e21356a2f3ef2b64f6c0c81fe3d3701b3a13dd259df828bb450f9f22fa1eefceb4ad6d76efe67f867c8
-
SSDEEP
98304:L0G+DjWM8JEE1FwamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEI5:LT+0zeNTfm/pf+xk4dWRimrbW3jmyc
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3