General

  • Target

    Luna (1).zip

  • Size

    6.9MB

  • Sample

    241012-jaez7szeqf

  • MD5

    8acf849bd0f7f89544f101a45be8bba3

  • SHA1

    4c199369169493770686c4288f9c774751aa4298

  • SHA256

    b542c2e6bf69958e374dabcf4dcd8b1a7257b34de205f2951a90c5c7f193f32d

  • SHA512

    4e9a3f6bf0c0306ffc307c1d2a4efb9a7d27d8476c44b76f899515d1f3b8bf09b656d03caac83d90cf996edcc4ac29948753bd7c61a2b53bd3df81e26b6bca0d

  • SSDEEP

    196608:tpftWz9PAMHPyWuCxvjJ+0h7e/YBX+CaRTkAWZCEiiIN:xWz9PFyWuCxvL9NHa2iEiiIN

Malware Config

Targets

    • Target

      Luna.exe

    • Size

      15.4MB

    • MD5

      62739a286b77c507ae0e7389494a273f

    • SHA1

      a8cbabf69186bd555a02f3a22bcf51602ece19bc

    • SHA256

      8469acf864f3ff7feb8e806e89dd2fdb8e2009af51a6e9d29688a54b529ec0c7

    • SHA512

      6953c80d39b767894c8d7eaee2a904eb8b446861145c1bba432934bca0f8853e4e4833ad7bdef114289e7282cf0e1a79f8d0aa5b2550a0f7011a628b97936b68

    • SSDEEP

      98304:mlzOdO2ivpCMxA4bkpGcE8MnOPpGf2DzX0OH01nPm4xqdZ1ZSQ:WXvpCGkpIOPPkVqm

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Network Share Discovery

      Attempt to gather information on host network.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks