C:\Users\santo\Desktop\nevermiss\ambatablowmapper\x64\Release\mapper.pdb
Overview
overview
3Static
static
3nevermisscc.rar
windows7-x64
3nevermisscc.rar
windows10-2004-x64
3nevermissc...a.json
windows7-x64
3nevermissc...a.json
windows10-2004-x64
3nevermissc...20.txt
windows7-x64
1nevermissc...20.txt
windows10-2004-x64
1nevermissc...er.exe
windows7-x64
1nevermissc...er.exe
windows10-2004-x64
1nevermissc...pd.exe
windows7-x64
1nevermissc...pd.exe
windows10-2004-x64
1nevermissc...me.txt
windows7-x64
1nevermissc...me.txt
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
nevermisscc.rar
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
nevermisscc.rar
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
nevermisscc/extra.json
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
nevermisscc/extra.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
nevermisscc/logs/log2024-06-25_01-49-20.txt
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
nevermisscc/logs/log2024-06-25_01-49-20.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
nevermisscc/mapper.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
nevermisscc/mapper.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
nevermisscc/nevermissupd.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
nevermisscc/nevermissupd.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
nevermisscc/readme.txt
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
nevermisscc/readme.txt
Resource
win10v2004-20240611-en
General
-
Target
nevermisscc.rar
-
Size
18.6MB
-
MD5
361ecb3b213d4e4729214ad6beaf231c
-
SHA1
6d5a91572bb3b64520151e367d52d6fe5229057c
-
SHA256
aa64423fad1b12ba8b65a8a7062225d7fd7e280fd6df2abbfcf6bd309358c08d
-
SHA512
26af471fe8e72741120074ff081db33f5c26534b62ae9c0f57c8a5ca1a621fcef55d0c2fdc3c7084158f3b899f5a8223774736e407cbeb9d4767d2ad61f141a0
-
SSDEEP
393216:V0RrGaXGJsmjihDb5cI1bG1ytW2iBivKf/KxbQnfvBFiLX2+PKNnX:V86aXG7ihH5b6A96ixWvBgLmrNX
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/nevermisscc/mapper.exe unpack001/nevermisscc/nevermissupd.exe
Files
-
nevermisscc.rar.rar
Password: Infected
-
nevermisscc/extra.json
-
nevermisscc/logs/log2024-06-25_01-49-20.txt
-
nevermisscc/mapper.exe.exe windows:6 windows x64 arch:x64
Password: Infected
54673e7cd50675946cf9dd80cc87b024
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
version
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
VerQueryValueW
kernel32
GetTempPathA
GetLastError
LoadLibraryA
GetVersionExA
CloseHandle
CreateFileW
GetProcAddress
DeleteCriticalSection
GetCurrentProcessId
Sleep
FormatMessageA
GetLocaleInfoEx
InitializeCriticalSectionEx
VirtualAlloc
DeviceIoControl
VirtualFree
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
LocalFree
AreFileApisANSI
GetModuleHandleW
MultiByteToWideChar
WideCharToMultiByte
IsDebuggerPresent
OutputDebugStringW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
advapi32
EnumServicesStatusA
CreateServiceA
CloseServiceHandle
QueryServiceConfigA
OpenSCManagerA
DeleteService
ControlService
StartServiceA
OpenServiceA
msvcp140
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
??7ios_base@std@@QEBA_NXZ
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?_Syserror_map@std@@YAPEBDH@Z
?_Winerror_map@std@@YAHH@Z
?good@ios_base@std@@QEBA_NXZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?_Xlength_error@std@@YAXPEBD@Z
?uncaught_exception@std@@YA_NXZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
ntdll
NtQuerySystemInformation
vcruntime140_1
__CxxFrameHandler4
vcruntime140
memcpy
__C_specific_handler
memset
__current_exception
strstr
__std_terminate
__std_exception_copy
__std_exception_destroy
__current_exception_context
memmove
_CxxThrowException
api-ms-win-crt-heap-l1-1-0
malloc
free
_set_new_mode
_callnewh
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
_lock_file
remove
api-ms-win-crt-string-l1-1-0
_stricmp
api-ms-win-crt-runtime-l1-1-0
_seh_filter_exe
_c_exit
_set_app_type
_get_initial_narrow_environment
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_register_thread_local_exe_atexit_callback
_initterm
_initterm_e
_register_onexit_function
__p___argv
_crt_atexit
__p___argc
terminate
_wassert
_invalid_parameter_noinfo_noreturn
_exit
_cexit
exit
api-ms-win-crt-stdio-l1-1-0
fgetc
fclose
fflush
fputc
__stdio_common_vfprintf
__acrt_iob_func
fgetpos
ungetc
fsetpos
fwrite
fread
_fseeki64
_get_stream_buffer_pointers
_set_fmode
setvbuf
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
___lc_codepage_func
api-ms-win-crt-math-l1-1-0
__setusermatherr
Sections
.text Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
nevermisscc/nevermissupd.exe.exe windows:6 windows x64 arch:x64
Password: Infected
cf89d0f979a3919e2b7ca2c06fac4e63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
winmm
PlaySoundA
kernel32
GetSystemDirectoryA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
DestroyWindow
gdi32
GetPixel
advapi32
CryptDestroyKey
shell32
SHGetFolderPathW
msvcp140
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
ntdll
RtlVirtualUnwind
d3d11
D3D11CreateDeviceAndSwapChain
imm32
ImmReleaseContext
d3dcompiler_43
D3DCompile
dwmapi
DwmExtendFrameIntoClientArea
d3dx11_43
D3DX11CreateShaderResourceViewFromMemory
shlwapi
PathFindFileNameW
rpcrt4
UuidToStringA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__C_specific_handler
api-ms-win-crt-heap-l1-1-0
_callnewh
api-ms-win-crt-runtime-l1-1-0
_errno
api-ms-win-crt-stdio-l1-1-0
fwrite
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-math-l1-1-0
fmodf
api-ms-win-crt-convert-l1-1-0
strtoull
api-ms-win-crt-filesystem-l1-1-0
_unlock_file
api-ms-win-crt-time-l1-1-0
_localtime64
api-ms-win-crt-string-l1-1-0
tolower
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
api-ms-win-crt-multibyte-l1-1-0
_mbsicmp
api-ms-win-crt-environment-l1-1-0
getenv
ws2_32
freeaddrinfo
normaliz
IdnToAscii
crypt32
CryptDecodeObjectEx
wldap32
ord211
Sections
.text Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 335KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1003KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.e4% Size: - Virtual size: 12.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.3^/ Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ZFr Size: 21.5MB - Virtual size: 21.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
nevermisscc/readme.txt