General
-
Target
neverlose crack.exe
-
Size
295KB
-
Sample
240902-k94y2sxarq
-
MD5
01cc2b2bcef2f12ab9a10905f999027d
-
SHA1
c62bb9b1532dc3f8638cc1ab5eb3b5f5185c2b40
-
SHA256
d51154dab49e7c3199cb9fd75aa5c7f9eb58ed74c8ea5eb40601ee484dc0b578
-
SHA512
025af3ae3fa059e364ef933cff47327436f08fb18379377caf7e71ced86f2c8adb4f56a79a643f3072c21b06e9e9b97f5945b9bdff1d29e798c6d9a5c3360d5c
-
SSDEEP
6144:DVOuy8Et9vsiTzIpoOhYyC8M4i7jyVvdOe4BWH5Y5/zu4cCGb19e:bFigGOTCz17jy9Yer6dzIpi
Static task
static1
Behavioral task
behavioral1
Sample
neverlose crack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
neverlose crack.exe
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
neverlose crack.exe
Resource
win10-20240404-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1273828074898718851/qR9eE6omxJxFL_jVry1J18IsVQ6bHhsk5rGr5VLxyO-92VJHyGPK43BBNMWtaUG56gE2
Extracted
asyncrat
Victim
127.0.0.1:1504
127.0.0.1:44256
meeting-compound.gl.at.ply.gg:1504
meeting-compound.gl.at.ply.gg:44256
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
meeting-compound.gl.at.ply.gg:1504
f8ff2d3def0ea5927a14148fb1c0ef4a
-
reg_key
f8ff2d3def0ea5927a14148fb1c0ef4a
-
splitter
Y262SUCZ4UJJ
Extracted
xworm
meeting-compound.gl.at.ply.gg:44256
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
neverlose crack.exe
-
Size
295KB
-
MD5
01cc2b2bcef2f12ab9a10905f999027d
-
SHA1
c62bb9b1532dc3f8638cc1ab5eb3b5f5185c2b40
-
SHA256
d51154dab49e7c3199cb9fd75aa5c7f9eb58ed74c8ea5eb40601ee484dc0b578
-
SHA512
025af3ae3fa059e364ef933cff47327436f08fb18379377caf7e71ced86f2c8adb4f56a79a643f3072c21b06e9e9b97f5945b9bdff1d29e798c6d9a5c3360d5c
-
SSDEEP
6144:DVOuy8Et9vsiTzIpoOhYyC8M4i7jyVvdOe4BWH5Y5/zu4cCGb19e:bFigGOTCz17jy9Yer6dzIpi
-
Detect Umbral payload
-
Detect Xworm Payload
-
Async RAT payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1