General

  • Target

    Luna-Grabber-main.zip

  • Size

    81KB

  • Sample

    240804-2qvdyayeqm

  • MD5

    5b43ee0cabf0c6e9b6ce5d2378fb3ab3

  • SHA1

    400477b90260c9e5f091b438ac82976922479b3c

  • SHA256

    db4c0444b68e434caa5965b702d5b6347904d32674339f399506aad531080ee6

  • SHA512

    471bb9ae51a6f915acc48b193adcb4545c773bf8a527c1de66841e9a2afa4aaa657b48ac4466a76df0962304b6e3361da3f06a0c665011e0df9123cf27f97ab9

  • SSDEEP

    1536:IPdUK2cQZf+vx2lAaBQ6aE3NxMALYHdJszqsZKXL:I18cY+MYjGMAidJszqsMXL

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/luna-stealer/luna-stealer/releases/download/vypix/luna.exe

Targets

    • Target

      Luna-Grabber-main/setup.bat

    • Size

      649B

    • MD5

      1bacf83af4b221ba871854d8e5ead34d

    • SHA1

      0a80a3c2eaba4e0c3c15b2c236af32a29729ac6e

    • SHA256

      561e4ab95fb2ffbe3c80133f9a624ff95ab5fc9a9b0fd6f7d87bf5c6d3d4ac05

    • SHA512

      c2066a01722c2f563b1a03a12477034696f4a3bc280e403156c2e1178eccda209a6daac9433d8a5164c07f506db15e0e46b510e59b18ca18794db9323d23c099

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks