General

  • Target

    Neverlose.zip

  • Size

    80.5MB

  • MD5

    eb06ee30a526bbd06b279377b9015690

  • SHA1

    0477c890ed884b44ca859de1dc1fa0164b5da4f5

  • SHA256

    b89e013e23131a66d168122479126b8d97ba0051e91649f147f3dd37e2013fd2

  • SHA512

    b4778b6e7e835de05a6b1617a6f2158e7621abf85bf034e129f45b437beff060f5ce5eaeb29bec4aee82d641a2cea9655c0c70d8e7a7d77d3c512d26a1658583

  • SSDEEP

    1572864:9TxkvnVaOZjorpD+W3prNKD2kl1PmO4Pc4ykD0aS2pIZEYHIIR:aV2dDx3JNsjjOOOvfyEYHTR

Malware Config

Signatures

  • Detect Pysilon 1 IoCs
  • Pysilon family
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

Files

  • Neverlose.zip
    .zip
  • CS İNTERNAL/CS_İNTERNAL_CHEAT/Neverlose.exe
    .exe windows:5 windows x64 arch:x64

    2ac23c52e7647c5bbea38e98bb68c652


    Headers

    Imports

    Sections

  • discord_token_grabber.pyc
  • get_cookies.pyc
  • misc.pyc
  • passwords_grabber.pyc
  • source_prepared.pyc
  • CS İNTERNAL/CS_İNTERNAL_CHEAT/Neverlose_crack.dll
    .dll windows:6 windows x86 arch:x86

    a224a5debd9bac0cd86ca6f57b4d1aee


    Headers

    Imports

    Sections

  • CS İNTERNAL/CS_İNTERNAL_CHEAT/cs2_cheat.dll
    .dll .ps1 windows:6 windows x64 arch:x64 polyglot

    79c66a30e47eefd8540bd8607a32f598


    Headers

    Imports

    Sections

  • CS İNTERNAL/CS_İNTERNAL_CHEAT/workspace/IY_FE.iy
  • CS İNTERNAL/CS_İNTERNAL_CHEAT/workspace/UISettings.ttwizz