General
-
Target
Luna-Grabber-main.zip
-
Size
51.2MB
-
Sample
240627-yef6dsxbqf
-
MD5
00e8d6ad69787248327e2def5404c716
-
SHA1
ce6b09752cdb9f1868efa82e76473513054dc650
-
SHA256
39f022c9d8c871076f40cbe64909a76a93e58d893ba31f0d76ba0ff7f355400f
-
SHA512
d74d62edb9e25599c16f4d89a3b37ce86a365170ae28493ee7b792da0f58442d715405e1c0c468c6f6adcf40517fca2f4ec5c815b1085fa440c56b6c8c7e4783
-
SSDEEP
786432:SXKBN3Eq/hQPwbCMnaujbIfzWnP4FE2IW1sem8NeeXmmNhuOUmrON92ZK8SH:QEUq/OP0CMdIbWnZ2Nm8Mgmsuj3e2
Static task
static1
Behavioral task
behavioral1
Sample
Luna-Grabber-main/python-3.10.9-amd64.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Luna-Grabber-main/python-3.10.9-amd64.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
Luna-Grabber-main/python-3.10.9-amd64.exe
-
Size
27.6MB
-
MD5
dce578fe177892488cadb6c34aea58ee
-
SHA1
e562807ddd0bc8366d936ce72684ce2b6630e297
-
SHA256
b8c707fb7a3a80f49af5a51c94f428525a3ad4331c7b9e3b2e321caf5cb56d7d
-
SHA512
8858aa7e82ca8cf559eeb25c14d86d24637a86e64c8db7465c99d05558ce3c67cea18d68abdfbe3df08cdbedfca5f819aa7fd8e57beae2054a7f7a8a64c04b41
-
SSDEEP
393216:rLQzCSAmQThdbDLP4+pG+ynEuB2EdPJPSmZ7SCZtnfhk1pACJ+DH5dTLwUTmhU+3:rqCLPxpG+tRKPJPSu7rkphcDnwhC7i
Score6/10-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1