General
-
Target
Luna (1).zip
-
Size
6.9MB
-
Sample
241012-jaez7szeqf
-
MD5
8acf849bd0f7f89544f101a45be8bba3
-
SHA1
4c199369169493770686c4288f9c774751aa4298
-
SHA256
b542c2e6bf69958e374dabcf4dcd8b1a7257b34de205f2951a90c5c7f193f32d
-
SHA512
4e9a3f6bf0c0306ffc307c1d2a4efb9a7d27d8476c44b76f899515d1f3b8bf09b656d03caac83d90cf996edcc4ac29948753bd7c61a2b53bd3df81e26b6bca0d
-
SSDEEP
196608:tpftWz9PAMHPyWuCxvjJ+0h7e/YBX+CaRTkAWZCEiiIN:xWz9PFyWuCxvL9NHa2iEiiIN
Static task
static1
Behavioral task
behavioral1
Sample
Luna.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Luna.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Luna.exe
-
Size
15.4MB
-
MD5
62739a286b77c507ae0e7389494a273f
-
SHA1
a8cbabf69186bd555a02f3a22bcf51602ece19bc
-
SHA256
8469acf864f3ff7feb8e806e89dd2fdb8e2009af51a6e9d29688a54b529ec0c7
-
SHA512
6953c80d39b767894c8d7eaee2a904eb8b446861145c1bba432934bca0f8853e4e4833ad7bdef114289e7282cf0e1a79f8d0aa5b2550a0f7011a628b97936b68
-
SSDEEP
98304:mlzOdO2ivpCMxA4bkpGcE8MnOPpGf2DzX0OH01nPm4xqdZ1ZSQ:WXvpCGkpIOPPkVqm
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1