General
-
Target
Lunar-cracked-by-wxcrack.rar
-
Size
14.3MB
-
Sample
241117-stvdnssgmc
-
MD5
ddf63fc13d9a0fdb12a37c79d8872e17
-
SHA1
34e5653001a40176637ff5a9e4addba3437120bf
-
SHA256
c6c414a0ffacb0fe53a8b61506e83ead35e21c5f42f902fa3a5f0a21e70796e6
-
SHA512
00f885aef2aa9d51df0bc2882c205038cd4387c7757336f282f3fa4fb8ce8fc3d921377db8d9fde6720cbf3d6bff17734d00447a214cd5c993578f3142961b63
-
SSDEEP
393216:egV/129gMjG5sDGEc58/NTZYZOBYXy2BO9SyQHh2hbdM:eG/1zMjCGGP8VTZYZIiy2BO9oHh2I
Behavioral task
behavioral1
Sample
Lunar-cracked-by-wxcrack/Lunarcracked.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Lunar-cracked-by-wxcrack/Lunarcracked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lunar-cracked-by-wxcrack/driver.sys
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Lunar-cracked-by-wxcrack/Lunarcracked.exe
-
Size
9.0MB
-
MD5
77c49f12984423a1398c2620240b48b1
-
SHA1
59cc6396d2e597092bf4069c09ff3f0c9682f25b
-
SHA256
3a4568331aba53006d5faf0508fd8c1beef3c8ca2632bc17090507e202bf85b9
-
SHA512
243020cd004907446f337404fd3c898bcd5e18f8df1f5ec49a7eb321daadf6d78e4944bf16902af3828993bb978e1dd316ead949b388e5ee4cf2cbcafd02b34e
-
SSDEEP
98304:CWSiUluTRKHurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJocSpXqjEwKhZ:CxlHurErvI9pWjgfPvzm6gs/SEjEF4fQ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Lunar-cracked-by-wxcrack/driver.sys
-
Size
17KB
-
MD5
8a17adcd8f3e544036dfdc25f2644922
-
SHA1
e03eec0ff44bb5ab27ab50acf71a89e0f15f90ad
-
SHA256
50bea91dfaff8335d4032c6a379dca922ddebaddcfde2f72b15d3a6dc2ff4e5a
-
SHA512
051efc8eaf2650b76a523a737a6726e44da45b384f1103086c29e1fde337d03e479410a08af846eb86314ba4804b7e09292f2c163bac770e1f07edf74edab7ef
-
SSDEEP
384:4e+AhSmf5h5VkR8Eb2Wb/wfT3iEx7bLDUjh0+:4e+AwmMi3iUbLDUjhT
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3