General

  • Target

    Lunar Client QT.rar

  • Size

    14.9MB

  • Sample

    240712-vl4y9asdnl

  • MD5

    798243247cf8527fb6eba99ae15ca34a

  • SHA1

    331ff2fe9452c36f4a848650056821ea946c0f05

  • SHA256

    720ace73308cff8dfa9fa901bb16fbfdf06c710c9cb3bdf8cc605a16fa9bdc71

  • SHA512

    d35c9cf48100426d1b2621aced8321a0f14a34176031087733d9a3d96966a724787d9028c32b6913a0911bf0c14b27b10668e167135904f24b201ce8077084d2

  • SSDEEP

    393216:JPa4apaHLZnG1CYQwkJHNhM21SjqzLyGSeL8H:hUpm88YUM21S2zLyGSei

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1199827155983540334/wOuXRytaInJxgcKgKWIEpFzDA-Ql9c0LTOOt-TVSoGsal-Opo1R9FMUJ5eRT9DxoMwpH

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1199507356149624992/yYxv23QxSPMnriWLzPfmpuKV6DmpVWTvUs_vhNe03ZvGcethD1CzszPdGz2SVxE0efQp

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1199827155983540334/wOuXRytaInJxgcKgKWIEpFzDA-Ql9c0LTOOt-TVSoGsal-Opo1R9FMUJ5eRT9DxoMwpH

Targets

    • Target

      Lunar Client QT.exe

    • Size

      16.5MB

    • MD5

      bf85c8b9da14bee8a76efff1616bfe1b

    • SHA1

      7ec3f344785c0d15d6637c76ca8bddf5deabf229

    • SHA256

      985c4d450a8f474507c53920ea50c486e65119f13a3f4e2aa95ffd8643789c46

    • SHA512

      e68dd0a416486e6f92b1d1fc31ad55f5a820f9433a60e0eabcb947a57a4991abb81f4f472476818a962ac36c7ca0de357ac00c6e6141322ed214a892f1125ac8

    • SSDEEP

      393216:fqkSmYfksuizYS8drCDqVOwB64DPo9FdplQVT8xIpFujFqGIkuz:HslzYpdrYqfAMSCVTVpFuxqGX

    • Detect Umbral payload

    • Mercurial Grabber Stealer

      Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks