General
-
Target
NeverLose Crack By SunTube.rar
-
Size
18.3MB
-
Sample
250114-y8d8ws1lbj
-
MD5
75c0279e5a8a67dd1ffb8acfe582d548
-
SHA1
222a6440dd33acec8d8d9b6af73bab75dc36114b
-
SHA256
773b0a591df8389ee2e256d22da04860e454e8323c1537818237030b9c9f535c
-
SHA512
3c2756faff307a0b27ba90fa48a80c157ff691eef3f24339f1af1306b62cc34b0f2fe3c13d116dcb26daf2622fe1dd1ce7def8e614bcc02608033094aaa6783e
-
SSDEEP
393216:JHouKBeIU8Ey2frK3xDibRvLzU3fRM+zQInU64wb4VVo1VtvT:JJKFCy2frKdibJLgpVcIUm4cVtL
Static task
static1
Behavioral task
behavioral1
Sample
NeverLose Crack By SunTube.rar
Resource
win10ltsc2021-20250113-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot6329762543:AAHEPfUNypbY9iSCcDWo6BRtHmGEdJrBGvE/sendMessage?chat_id=927516584
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
NeverLose Crack By SunTube.rar
-
Size
18.3MB
-
MD5
75c0279e5a8a67dd1ffb8acfe582d548
-
SHA1
222a6440dd33acec8d8d9b6af73bab75dc36114b
-
SHA256
773b0a591df8389ee2e256d22da04860e454e8323c1537818237030b9c9f535c
-
SHA512
3c2756faff307a0b27ba90fa48a80c157ff691eef3f24339f1af1306b62cc34b0f2fe3c13d116dcb26daf2622fe1dd1ce7def8e614bcc02608033094aaa6783e
-
SSDEEP
393216:JHouKBeIU8Ey2frK3xDibRvLzU3fRM+zQInU64wb4VVo1VtvT:JJKFCy2frKdibJLgpVcIUm4cVtL
-
Asyncrat family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1