General

  • Target

    lunarcracked.exe

  • Size

    12.0MB

  • Sample

    241119-y3475a1hqa

  • MD5

    3c516b9365ebe27f3aaacc2491955e06

  • SHA1

    39339f154a15e78e6f760af3fca73ebca22da296

  • SHA256

    6606e3850e54c7054e9695f2b810bcf340e53c5aea1c673bcffdda04a82528af

  • SHA512

    c7f8b891083934127d582dad2500f427846f233f1481056a32347e7d3901c9f4c60c92ed1dc61b91d5a57dbcd082f8b32bcda869f7d0301c1b798b64d59d20ac

  • SSDEEP

    98304:asMcriurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMG:a9urErvI9pWjgyvoaYrE41JIuICoxJ

Malware Config

Targets

    • Target

      lunarcracked.exe

    • Size

      12.0MB

    • MD5

      3c516b9365ebe27f3aaacc2491955e06

    • SHA1

      39339f154a15e78e6f760af3fca73ebca22da296

    • SHA256

      6606e3850e54c7054e9695f2b810bcf340e53c5aea1c673bcffdda04a82528af

    • SHA512

      c7f8b891083934127d582dad2500f427846f233f1481056a32347e7d3901c9f4c60c92ed1dc61b91d5a57dbcd082f8b32bcda869f7d0301c1b798b64d59d20ac

    • SSDEEP

      98304:asMcriurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMG:a9urErvI9pWjgyvoaYrE41JIuICoxJ

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      *1��}>.pyc

    • Size

      1KB

    • MD5

      c9b918ca50687e3d16d3f3c66619d8ef

    • SHA1

      66f771a1504e9875b37ef5813cff61eead68a667

    • SHA256

      334c9d9dc8584eee3fa260c9c49c20e29aa9f911182f8e10d46f2ec45899b4c2

    • SHA512

      c645a6e721bd2d736c84da2f1b14db7bb1d60cf8ecceb1394254449715ee13d56a84dcba1604d25191acd5d258d4c6db5beb0a2946ebef5548f2fba18297e5e8

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks