General
-
Target
NightVerse Setup.exe
-
Size
47.5MB
-
Sample
240804-vqc2bsvdje
-
MD5
66a83a3a5e3d36a47a847b8fc5d01c53
-
SHA1
a94b75ef8d674f31628ed6266471aecb8b925753
-
SHA256
693a9860b2d4887e92be1c28fe63953e0569317936dfcc50255e494e45b6e933
-
SHA512
f9498de29b347cca3cc155cab2d519e3dba0b5e54b4f0687869d51ebbb9d56682e10f334b9865eb6c89433d121e24383bb98b1470d256dc2a0ffb94b5f8eaa78
-
SSDEEP
786432:P8YKTA14un2K69+Jcs7fd8V2IwD69bJQdW7tugnY5JOCLTawPvSInTu9D+OuF2:P+voczOKdYc0kzwiInVJ2
Static task
static1
Behavioral task
behavioral1
Sample
NightVerse Setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
NightVerse Setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
NightVerse Setup.exe
Resource
win11-20240802-en
Malware Config
Extracted
stealc
night4
http://195.211.124.201
-
url_path
/be7c600e19a47f1c.php
Targets
-
-
Target
NightVerse Setup.exe
-
Size
47.5MB
-
MD5
66a83a3a5e3d36a47a847b8fc5d01c53
-
SHA1
a94b75ef8d674f31628ed6266471aecb8b925753
-
SHA256
693a9860b2d4887e92be1c28fe63953e0569317936dfcc50255e494e45b6e933
-
SHA512
f9498de29b347cca3cc155cab2d519e3dba0b5e54b4f0687869d51ebbb9d56682e10f334b9865eb6c89433d121e24383bb98b1470d256dc2a0ffb94b5f8eaa78
-
SSDEEP
786432:P8YKTA14un2K69+Jcs7fd8V2IwD69bJQdW7tugnY5JOCLTawPvSInTu9D+OuF2:P+voczOKdYc0kzwiInVJ2
-
Detects HijackLoader (aka IDAT Loader)
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2