General

  • Target

    Lunar Z.exe

  • Size

    17.9MB

  • Sample

    241001-tw7mfsyfrm

  • MD5

    6ca99855187de9e3a26adf311dec1d06

  • SHA1

    cd6d4c08503f3cad0836c5269c7dbb6c1e69d663

  • SHA256

    16fbe3269ec5d2001b10d3194eb593142937c61eae5677fb5f0648f5f7d2fdba

  • SHA512

    73e19062035785bd0cbf86a1fb883c4f4c5ab903be66b8cbd5555bd6948e6f4bc165c56d70a748c696b1a5eef167090ed1e772dbfd609afeb455d45c67e26724

  • SSDEEP

    393216:QqPnLFXlrGBQ+DOETgsvfG92gtpvE4lKj/kfqq:RPLFXNGBQ/ENEeFj/G

Malware Config

Targets

    • Target

      Lunar Z.exe

    • Size

      17.9MB

    • MD5

      6ca99855187de9e3a26adf311dec1d06

    • SHA1

      cd6d4c08503f3cad0836c5269c7dbb6c1e69d663

    • SHA256

      16fbe3269ec5d2001b10d3194eb593142937c61eae5677fb5f0648f5f7d2fdba

    • SHA512

      73e19062035785bd0cbf86a1fb883c4f4c5ab903be66b8cbd5555bd6948e6f4bc165c56d70a748c696b1a5eef167090ed1e772dbfd609afeb455d45c67e26724

    • SSDEEP

      393216:QqPnLFXlrGBQ+DOETgsvfG92gtpvE4lKj/kfqq:RPLFXNGBQ/ENEeFj/G

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks