General
-
Target
MoonLogger.exe
-
Size
6.0MB
-
Sample
241021-w8cnys1bra
-
MD5
627d89185fa96cabec0dacc7bcd55264
-
SHA1
0ac231d45a5f33de1c7b0f01f073fb42e43aa7d1
-
SHA256
a00a4bc63683e9eb6f0e52f7e12b9120fa97baa88a3ac1398d0e70c199790777
-
SHA512
258536d6f48746e424613b84d33094e879487dc1613810c3bce0fd5d21ec33116353b26797559ee4acf05337e59bdee4faf5707b11af33728fb52c6495185dff
-
SSDEEP
98304:hXEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGKCRTkdOcwcxsXQrmhEi:hmFFeN/FJMIDJf/gsAGKCRTJ9cxZK
Behavioral task
behavioral1
Sample
MoonLogger.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
MoonLogger.exe
-
Size
6.0MB
-
MD5
627d89185fa96cabec0dacc7bcd55264
-
SHA1
0ac231d45a5f33de1c7b0f01f073fb42e43aa7d1
-
SHA256
a00a4bc63683e9eb6f0e52f7e12b9120fa97baa88a3ac1398d0e70c199790777
-
SHA512
258536d6f48746e424613b84d33094e879487dc1613810c3bce0fd5d21ec33116353b26797559ee4acf05337e59bdee4faf5707b11af33728fb52c6495185dff
-
SSDEEP
98304:hXEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGKCRTkdOcwcxsXQrmhEi:hmFFeN/FJMIDJf/gsAGKCRTJ9cxZK
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-