General
-
Target
Neverlose.rar
-
Size
2.0MB
-
Sample
241204-l4my1sxmgn
-
MD5
722db6635fa7aafd05fab9000272d49b
-
SHA1
b9ecc26a64d76f672f44d4d39fe31871786ad590
-
SHA256
19348fd43d70e3dd8effb8431e75f566ec33875889e7a4bacf08535b6667b259
-
SHA512
f90bcbfa5d34303bde2b84b95b0af5a22ca64a02c8e05c05ff1f5a85f8a5927858b07d9ca039e5e14b5141d5bf2988711ffd37da776f242449961c2bde636b1e
-
SSDEEP
49152:mnhi9eCBG1sfAO7cD9counMZguk1zXQ4zdKvDnd5NEoQQxFRls:mA9CDmIRIA4z2DnLeoQQzc
Behavioral task
behavioral1
Sample
Neverlose.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Neverlose.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Neverlose.exe
-
Size
2.6MB
-
MD5
1924cb0ae8b7ccca9e8030087ecc5a94
-
SHA1
a1f4565cb089b27fd3deacd0fd93733f8f0f4c32
-
SHA256
ffc00ef9763576969540d6f2d16a929bad4c3ffc9f4e97cf60206f56a2a7718d
-
SHA512
46ac86ae174c77cd3c81a63a6bce589260a4412d29d4704caa8bc4a064d62859f37fdfb2f5dea48e3c415c5db074f964af732c34b0e2e2ea56db6505124d33ad
-
SSDEEP
49152:ubA3jHZLMGaxfSIkbO+7+KrktBibbg8LU7x/5uzMk+:ub4Z4Bxqg4rkvibb1Yt5u1+
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1