General

  • Target

    neverlose crack.exe

  • Size

    295KB

  • Sample

    240902-k94y2sxarq

  • MD5

    01cc2b2bcef2f12ab9a10905f999027d

  • SHA1

    c62bb9b1532dc3f8638cc1ab5eb3b5f5185c2b40

  • SHA256

    d51154dab49e7c3199cb9fd75aa5c7f9eb58ed74c8ea5eb40601ee484dc0b578

  • SHA512

    025af3ae3fa059e364ef933cff47327436f08fb18379377caf7e71ced86f2c8adb4f56a79a643f3072c21b06e9e9b97f5945b9bdff1d29e798c6d9a5c3360d5c

  • SSDEEP

    6144:DVOuy8Et9vsiTzIpoOhYyC8M4i7jyVvdOe4BWH5Y5/zu4cCGb19e:bFigGOTCz17jy9Yer6dzIpi

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1273828074898718851/qR9eE6omxJxFL_jVry1J18IsVQ6bHhsk5rGr5VLxyO-92VJHyGPK43BBNMWtaUG56gE2

Extracted

Family

asyncrat

Botnet

Victim

C2

127.0.0.1:1504

127.0.0.1:44256

meeting-compound.gl.at.ply.gg:1504

meeting-compound.gl.at.ply.gg:44256

Attributes
  • delay

    1

  • install

    true

  • install_file

    System.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

Victim

C2

meeting-compound.gl.at.ply.gg:1504

Mutex

f8ff2d3def0ea5927a14148fb1c0ef4a

Attributes
  • reg_key

    f8ff2d3def0ea5927a14148fb1c0ef4a

  • splitter

    Y262SUCZ4UJJ

Extracted

Family

xworm

C2

meeting-compound.gl.at.ply.gg:44256

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      neverlose crack.exe

    • Size

      295KB

    • MD5

      01cc2b2bcef2f12ab9a10905f999027d

    • SHA1

      c62bb9b1532dc3f8638cc1ab5eb3b5f5185c2b40

    • SHA256

      d51154dab49e7c3199cb9fd75aa5c7f9eb58ed74c8ea5eb40601ee484dc0b578

    • SHA512

      025af3ae3fa059e364ef933cff47327436f08fb18379377caf7e71ced86f2c8adb4f56a79a643f3072c21b06e9e9b97f5945b9bdff1d29e798c6d9a5c3360d5c

    • SSDEEP

      6144:DVOuy8Et9vsiTzIpoOhYyC8M4i7jyVvdOe4BWH5Y5/zu4cCGb19e:bFigGOTCz17jy9Yer6dzIpi

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Detect Umbral payload

    • Detect Xworm Payload

    • UAC bypass

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Xworm

      Xworm is a remote access trojan written in C#.

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Async RAT payload

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks