General

  • Target

    NeverLose.zip

  • Size

    5.8MB

  • Sample

    241219-rqtsastqct

  • MD5

    9a2a9f2c5e778d9fcee3f4765631861c

  • SHA1

    2b50d4c6003c16aaf8a9cc325e6cdb7d1307b29d

  • SHA256

    074d927ddfcd2dd18390c666a51e078909d3fdc1c7f7e069bda0550947c0418b

  • SHA512

    0618fee78c45dc031581a8cc8727b020263d995f28f96b9bf853832db7b79a7f5bf0ebbe5bfc4840b9a81e947f2e744e829616e59782a40df1c22400db247f50

  • SSDEEP

    98304:U52Y25U9C3YSm4HsNZEXDPhlHc0XBjGLQ3ysRYDvwiEFw6Q/+4C7FNjqv4CK1kp4:BCQYSZsN2X7/tX1UQ3LCDjEFG+7FNjqQ

Malware Config

Targets

    • Target

      NeverLose.exe

    • Size

      5.9MB

    • MD5

      5cbb0d08ce5143a418f159df08a00bd3

    • SHA1

      2abb336433c978692a62ce3cfe637b0657d1aa36

    • SHA256

      f40711cbefdd42c0f13fa4ae65bb1be4bd0759ce919fddf591d761499dcf9c9e

    • SHA512

      5880c58301a4457ac67d6f84c38f06723fa257c1bcb58c4bd8e98bdb5cc5dc0f36733d62141b93d794f097559a0324ce7aa79014c5f9e0a1bb87897ea68ce620

    • SSDEEP

      98304:DfmoDUN43WQqkjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6actMFgZ:DfumWQBOjmFwDRxtYSHdK34kdai7bN3t

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks