General
-
Target
lunarcracked.exe
-
Size
12.0MB
-
Sample
241119-y3475a1hqa
-
MD5
3c516b9365ebe27f3aaacc2491955e06
-
SHA1
39339f154a15e78e6f760af3fca73ebca22da296
-
SHA256
6606e3850e54c7054e9695f2b810bcf340e53c5aea1c673bcffdda04a82528af
-
SHA512
c7f8b891083934127d582dad2500f427846f233f1481056a32347e7d3901c9f4c60c92ed1dc61b91d5a57dbcd082f8b32bcda869f7d0301c1b798b64d59d20ac
-
SSDEEP
98304:asMcriurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMG:a9urErvI9pWjgyvoaYrE41JIuICoxJ
Behavioral task
behavioral1
Sample
lunarcracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lunarcracked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
*1��}>.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
*1��}>.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
lunarcracked.exe
-
Size
12.0MB
-
MD5
3c516b9365ebe27f3aaacc2491955e06
-
SHA1
39339f154a15e78e6f760af3fca73ebca22da296
-
SHA256
6606e3850e54c7054e9695f2b810bcf340e53c5aea1c673bcffdda04a82528af
-
SHA512
c7f8b891083934127d582dad2500f427846f233f1481056a32347e7d3901c9f4c60c92ed1dc61b91d5a57dbcd082f8b32bcda869f7d0301c1b798b64d59d20ac
-
SSDEEP
98304:asMcriurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuI/KU73bcgVowjMG:a9urErvI9pWjgyvoaYrE41JIuICoxJ
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
*1��}>.pyc
-
Size
1KB
-
MD5
c9b918ca50687e3d16d3f3c66619d8ef
-
SHA1
66f771a1504e9875b37ef5813cff61eead68a667
-
SHA256
334c9d9dc8584eee3fa260c9c49c20e29aa9f911182f8e10d46f2ec45899b4c2
-
SHA512
c645a6e721bd2d736c84da2f1b14db7bb1d60cf8ecceb1394254449715ee13d56a84dcba1604d25191acd5d258d4c6db5beb0a2946ebef5548f2fba18297e5e8
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1