General

  • Target

    Moon_Loader_1.exe

  • Size

    18.6MB

  • Sample

    230203-gxelvabg73

  • MD5

    b4dd4dfef1b375ba60b61dc8826d8f32

  • SHA1

    b1fd217e55a8bcf6e5b268166f6d10f1b6dc1431

  • SHA256

    70f310f9f220081b48711326a0df031ebac2939eca74c65542f3d79bd2a09a34

  • SHA512

    270ef3947f3f549638c9fe5d6d7d286678b7df30fb0fd4a6b082a548d5840f259fd933a2720d4127dfc9d76ffa5ddcbd68b65979dd2e054194d4f6f69f68682a

  • SSDEEP

    393216:Du7L/OtASFu11dQuslN/m3pDl9AJ4ZoWOv+9rzPV4aBIOh+Yd:DCLuFOdQu4KRS4ZorvSrLnh7

Malware Config

Targets

    • Target

      Moon_Loader_1.exe

    • Size

      18.6MB

    • MD5

      b4dd4dfef1b375ba60b61dc8826d8f32

    • SHA1

      b1fd217e55a8bcf6e5b268166f6d10f1b6dc1431

    • SHA256

      70f310f9f220081b48711326a0df031ebac2939eca74c65542f3d79bd2a09a34

    • SHA512

      270ef3947f3f549638c9fe5d6d7d286678b7df30fb0fd4a6b082a548d5840f259fd933a2720d4127dfc9d76ffa5ddcbd68b65979dd2e054194d4f6f69f68682a

    • SSDEEP

      393216:Du7L/OtASFu11dQuslN/m3pDl9AJ4ZoWOv+9rzPV4aBIOh+Yd:DCLuFOdQu4KRS4ZorvSrLnh7

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks