General
-
Target
Luna-Grabber-main.zip
-
Size
81KB
-
Sample
240804-2qvdyayeqm
-
MD5
5b43ee0cabf0c6e9b6ce5d2378fb3ab3
-
SHA1
400477b90260c9e5f091b438ac82976922479b3c
-
SHA256
db4c0444b68e434caa5965b702d5b6347904d32674339f399506aad531080ee6
-
SHA512
471bb9ae51a6f915acc48b193adcb4545c773bf8a527c1de66841e9a2afa4aaa657b48ac4466a76df0962304b6e3361da3f06a0c665011e0df9123cf27f97ab9
-
SSDEEP
1536:IPdUK2cQZf+vx2lAaBQ6aE3NxMALYHdJszqsZKXL:I18cY+MYjGMAidJszqsMXL
Static task
static1
Behavioral task
behavioral1
Sample
Luna-Grabber-main/setup.bat
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Luna-Grabber-main/setup.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://github.com/luna-stealer/luna-stealer/releases/download/vypix/luna.exe
Targets
-
-
Target
Luna-Grabber-main/setup.bat
-
Size
649B
-
MD5
1bacf83af4b221ba871854d8e5ead34d
-
SHA1
0a80a3c2eaba4e0c3c15b2c236af32a29729ac6e
-
SHA256
561e4ab95fb2ffbe3c80133f9a624ff95ab5fc9a9b0fd6f7d87bf5c6d3d4ac05
-
SHA512
c2066a01722c2f563b1a03a12477034696f4a3bc280e403156c2e1178eccda209a6daac9433d8a5164c07f506db15e0e46b510e59b18ca18794db9323d23c099
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1