General

  • Target

    Neverlose.zip

  • Size

    5.9MB

  • Sample

    241230-amv3hs1pcw

  • MD5

    faa79770dba4e36580e7ba6ea809bc29

  • SHA1

    9e926f79b63ee81d376061fef1d575b17d7062b9

  • SHA256

    8534a3f47fde6425a97c9cf70c43c3bd1a6c52fb45403ee749894de1dc59a2f1

  • SHA512

    c13e27cd933afe2543ffe973752eec8b2e6e77a7dea3b3c5a34e8c39826c562a153fc7b05b6e4a48f8003358c8216b78d7972dc8426e8209b5bdbdf726ce6beb

  • SSDEEP

    98304:2xHehOElbTaVyZ/1pn6JtTra6m13aNUMUc1zno6CULy1SnAK4nJ77:BOElbTa41BkhNUDULPARh

Malware Config

Targets

    • Target

      Neverlose.exe

    • Size

      36.0MB

    • MD5

      58f0ad37791fbb35acd3d654c2ddce5c

    • SHA1

      c13ab552ca6bc6fe897e5cfa4eb05256dc1653ec

    • SHA256

      755e2b983fad90014d418613a2cfd0faa9cc5e7d771b1f42d0725a514401a98c

    • SHA512

      787156872b3d8c0ce937f1cd34ace636e8bab74a803c48d2d6de6fa7b6c91765b6e9713f218ad64f4d01d14a1b479d9e4ec004d50fad530f45dfb9132eae6032

    • SSDEEP

      196608:/jumWQWuOjmFwDRxtYSHdK34kdai7bN3m2R6xz:ibJK2pM9B3Qoez

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks