Overview
overview
10Static
static
10Night Mev/Leia.txt
windows10-2004-x64
1Night Mev/Leia.txt
windows10-ltsc 2021-x64
1Night Mev/Leia.txt
windows11-21h2-x64
3Night Mev/...ev.exe
windows10-2004-x64
8Night Mev/...ev.exe
windows10-ltsc 2021-x64
10Night Mev/...ev.exe
windows11-21h2-x64
8�R�`��.pyc
windows10-2004-x64
�R�`��.pyc
windows10-ltsc 2021-x64
�R�`��.pyc
windows11-21h2-x64
Night Mev/...ll.ini
windows10-2004-x64
1Night Mev/...ll.ini
windows10-ltsc 2021-x64
1Night Mev/...ll.ini
windows11-21h2-x64
3General
-
Target
Night Mev.rar
-
Size
8.4MB
-
Sample
250124-b3eadavmeq
-
MD5
f1ffa4e56a276f6224015b22bd70c043
-
SHA1
54103ceba0c49e81312dbf18dbb02976783cf953
-
SHA256
b29ef42de1c3466f80c4f46b198d2f744a5938dca50c073e171da9bef538a96f
-
SHA512
4075ef8c7f0f2ec9caa5d141b080efd639a52f1326243e254ef1e40d79ee6afdd45e982f89bbf2f81b9cfe6cf10f3aa9e651106ef4f700980521286f258bed12
-
SSDEEP
196608:wv+F4MFoZk04uFZnlCKNb7KhkrlDzBm8tIAYrfrajFsXi2tRI/:VWMCk03FZlCK1akBU8t1YrYH2tI
Behavioral task
behavioral1
Sample
Night Mev/Leia.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Night Mev/Leia.txt
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
Night Mev/Leia.txt
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Night Mev/Night Mev.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Night Mev/Night Mev.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
Night Mev/Night Mev.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
�R�`��.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
�R�`��.pyc
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral9
Sample
�R�`��.pyc
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Night Mev/Nigt.dll.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Night Mev/Nigt.dll.ini
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral12
Sample
Night Mev/Nigt.dll.ini
Resource
win11-20241023-en
Malware Config
Targets
-
-
Target
Night Mev/Leia.txt
-
Size
19B
-
MD5
2ccaee7c862bba614761735783d7c79c
-
SHA1
8413bd48676106662be229b41eed6f49f7063a76
-
SHA256
d846ba5fbf34cffb5885ec1e3db6bfd398676cb3325f95478dde776bbcdec5cc
-
SHA512
efbc6b8d44ab0185fac2cf3ba23db851a6dd5213f1a080c52f560aeee6f18610dc530b9b675bc4182d4aebe06c64abfcbc85a7a379b264febb87404c29f963cd
Score3/10 -
-
-
Target
Night Mev/Night Mev.exe
-
Size
8.5MB
-
MD5
dab2253217e774567d2fbe0451622d25
-
SHA1
b1383ad0ae5b347a2d81786ea3b614c8735048ca
-
SHA256
b5d35a1a329376df0652f0b04be9e16f1d0cda5a4eacddd65073f5538f65fc58
-
SHA512
8e2ebc15bb9717b85e86509a118186c59a5ba1f1c6c547d87eebc47816961266ad03f760597162dc4fa514541dfe7e125a3fb6dba893fc80884a5ffaccfe493b
-
SSDEEP
196608:sVD+kdGOmYwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWY:W54OIIHL7HmBYXrYoaUND
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Enumerates processes with tasklist
-
-
-
Target
�R�`��.pyc
-
Size
1KB
-
MD5
82a4555321d467e1dfae47b984b887b4
-
SHA1
df467fba9b7d802cd3e09d305f35745acc774221
-
SHA256
0636c5de306f26b8710d9fb6a1f592d1d023882da13721d853652a0d44f65d79
-
SHA512
aaa7de8bc0ae70f1996db0861e2617f90ab61a64a26f061ed38136b8559edb1f62e4163d0c4e8ead36d3f48c98b209e47ec70b1c9475b9730e9443dce6606bd0
Score1/10 -
-
-
Target
Night Mev/Nigt.dll.ini
-
Size
591B
-
MD5
384411d52a1194aea00cfeef4cfca1f4
-
SHA1
680ffbb4e09a883b85165eccef56a33245302a56
-
SHA256
aa40a5b32600368c8304d4b3c5f324842fefadb0bb7a73c9d60127710345ca4c
-
SHA512
d46cce8214d7da08c737e93ca5630c54d82b7a1a60b5c360a2f6ea006081c302afeb23c7a0694bea6cf68dcd25ec93d82b8cf673184274dad674bc42b3cb7b51
Score3/10 -