Resubmissions

04-08-2024 17:11

240804-vqc2bsvdje 10

04-08-2024 16:58

240804-vgsqesvbnb 7

General

  • Target

    NightVerse Setup.exe

  • Size

    47.5MB

  • Sample

    240804-vqc2bsvdje

  • MD5

    66a83a3a5e3d36a47a847b8fc5d01c53

  • SHA1

    a94b75ef8d674f31628ed6266471aecb8b925753

  • SHA256

    693a9860b2d4887e92be1c28fe63953e0569317936dfcc50255e494e45b6e933

  • SHA512

    f9498de29b347cca3cc155cab2d519e3dba0b5e54b4f0687869d51ebbb9d56682e10f334b9865eb6c89433d121e24383bb98b1470d256dc2a0ffb94b5f8eaa78

  • SSDEEP

    786432:P8YKTA14un2K69+Jcs7fd8V2IwD69bJQdW7tugnY5JOCLTawPvSInTu9D+OuF2:P+voczOKdYc0kzwiInVJ2

Malware Config

Extracted

Family

stealc

Botnet

night4

C2

http://195.211.124.201

Attributes
  • url_path

    /be7c600e19a47f1c.php

Targets

    • Target

      NightVerse Setup.exe

    • Size

      47.5MB

    • MD5

      66a83a3a5e3d36a47a847b8fc5d01c53

    • SHA1

      a94b75ef8d674f31628ed6266471aecb8b925753

    • SHA256

      693a9860b2d4887e92be1c28fe63953e0569317936dfcc50255e494e45b6e933

    • SHA512

      f9498de29b347cca3cc155cab2d519e3dba0b5e54b4f0687869d51ebbb9d56682e10f334b9865eb6c89433d121e24383bb98b1470d256dc2a0ffb94b5f8eaa78

    • SSDEEP

      786432:P8YKTA14un2K69+Jcs7fd8V2IwD69bJQdW7tugnY5JOCLTawPvSInTu9D+OuF2:P+voczOKdYc0kzwiInVJ2

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Data from Local System

1
T1005

Tasks