Resubmissions

25-01-2025 01:11

250125-bjz3qsyrgm 10

24-01-2025 18:59

250124-xm35fssqgz 10

General

  • Target

    Wave.exe

  • Size

    83.9MB

  • Sample

    250125-bjz3qsyrgm

  • MD5

    6d5ed7a44e96bc0a50e0e694723bba78

  • SHA1

    bda9c467e6d0ef552253e453aeee08a43c09b1f9

  • SHA256

    7f5f60cae85f7bd49733c371942ad380928fac16c9d3f2e31459319705a1231e

  • SHA512

    ddec21c27ba9a77ab14baa4e88307a8bf79b325eb9b7c63afda0a012fb38099424315939971399ed7349ff3d059b69aa28ed4338df68199498f3fe07349e2fe1

  • SSDEEP

    1572864:qVjlGW4Fm7OkiqOv8im2AqlE7xlhpqfiYweyJulZUdg14Ead72:2InFm7OknOv8i3diLNpuB41Z2

Malware Config

Targets

    • Target

      Wave.exe

    • Size

      83.9MB

    • MD5

      6d5ed7a44e96bc0a50e0e694723bba78

    • SHA1

      bda9c467e6d0ef552253e453aeee08a43c09b1f9

    • SHA256

      7f5f60cae85f7bd49733c371942ad380928fac16c9d3f2e31459319705a1231e

    • SHA512

      ddec21c27ba9a77ab14baa4e88307a8bf79b325eb9b7c63afda0a012fb38099424315939971399ed7349ff3d059b69aa28ed4338df68199498f3fe07349e2fe1

    • SSDEEP

      1572864:qVjlGW4Fm7OkiqOv8im2AqlE7xlhpqfiYweyJulZUdg14Ead72:2InFm7OknOv8i3diLNpuB41Z2

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks