General

  • Target

    NeverLose.exe

  • Size

    2.4MB

  • Sample

    250123-ntv8razqam

  • MD5

    4a20d992a3e773d0fc70d29d27217fe5

  • SHA1

    237ea4f9f0d167d3161ac8cba193b2e79b7cdd84

  • SHA256

    a69f30c1b304b7f6c85facbbd598f1ebdfdc967488f1bf0617b3bddc3a3a4e86

  • SHA512

    7bd12dbb3b051ee6b47ab734047ee06929ec5cbdda6c5be47513644257e75b10a6414e11503a7323ad3851a71c86932803e3d691e7d8f0cedb9625830ea0d270

  • SSDEEP

    49152:tBELVoj3mruOsvEsgZpfyECvOhsX7/iEuHTClwGe:nQI0zLhpfTCWhsL/iEMUu

Malware Config

Targets

    • Target

      NeverLose.exe

    • Size

      2.4MB

    • MD5

      4a20d992a3e773d0fc70d29d27217fe5

    • SHA1

      237ea4f9f0d167d3161ac8cba193b2e79b7cdd84

    • SHA256

      a69f30c1b304b7f6c85facbbd598f1ebdfdc967488f1bf0617b3bddc3a3a4e86

    • SHA512

      7bd12dbb3b051ee6b47ab734047ee06929ec5cbdda6c5be47513644257e75b10a6414e11503a7323ad3851a71c86932803e3d691e7d8f0cedb9625830ea0d270

    • SSDEEP

      49152:tBELVoj3mruOsvEsgZpfyECvOhsX7/iEuHTClwGe:nQI0zLhpfTCWhsL/iEMUu

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks