General

  • Target

    tri.rar

  • Size

    17.5MB

  • Sample

    241201-nr8fasvmfn

  • MD5

    48fd699e9cba54f5c9fb09a3d362aedf

  • SHA1

    f130049b001902d7fcad58f13d6b47f0d055acca

  • SHA256

    4ee66020bf8fd5606f1fa1835a6c2328aab1556035e44a2de60b87c8f8571375

  • SHA512

    7e80794fb6d765ef42236c4fa16a53f817df2a163e944a31513344c1d74379a1ca5df02eafd188294c65b39c47db7d748c30de58ae95693bf161216bcb67e6a8

  • SSDEEP

    393216:1vAMSV/Hy1IrjMr8wyVQvm21KpM1pfWbQVjxm3rYR:1oPyOkwBCpK6WsVtm3rC

Malware Config

Targets

    • Target

      Lunar spoofer.exe

    • Size

      17.7MB

    • MD5

      307c9c8d33c5e29dedbdfcefa76fb08f

    • SHA1

      412d4dfde8ce9c5ae4cbaec828a7b7d75e9ca85e

    • SHA256

      ee7be92913e679dd66d5a5a62cc8b78a4093da9344cce8ab7058fc8e6ea766c4

    • SHA512

      278ecaace8468273c9ec6eb47f8435e31cb4525124dd9e0142f49e3825a23d5fcb95b4e9e17a74432c2f5dd3d9b736c4009f0d59d952ff0c01429416cb394245

    • SSDEEP

      393216:gqPnLFXlrVgQpDOETgsvfGzugNsxqvEiA/IQGL7Sq:hPLFXN6QoEx2sZiykv

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      serial_checker.bat

    • Size

      1KB

    • MD5

      efa2cd30989448f5690130b07ccce86a

    • SHA1

      0c3203f67c67cf63d39894a0577f20d5dc1427e8

    • SHA256

      86710039b7414ff861ca629c839e89eb5eaf74cff86129734c575e5716c1a552

    • SHA512

      c2f7dfb10f311ba6684651ca4e8aee8408e5abf6c2f564ce2764c0bac8df07da0b742bedff992d2ff9f6b00a1d6b1423d09390653c0fd0d47303984183db358e

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks