General
-
Target
tri.rar
-
Size
17.5MB
-
Sample
241201-nvgfzsvmhq
-
MD5
48fd699e9cba54f5c9fb09a3d362aedf
-
SHA1
f130049b001902d7fcad58f13d6b47f0d055acca
-
SHA256
4ee66020bf8fd5606f1fa1835a6c2328aab1556035e44a2de60b87c8f8571375
-
SHA512
7e80794fb6d765ef42236c4fa16a53f817df2a163e944a31513344c1d74379a1ca5df02eafd188294c65b39c47db7d748c30de58ae95693bf161216bcb67e6a8
-
SSDEEP
393216:1vAMSV/Hy1IrjMr8wyVQvm21KpM1pfWbQVjxm3rYR:1oPyOkwBCpK6WsVtm3rC
Behavioral task
behavioral1
Sample
Lunar spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Lunar spoofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
serial_checker.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
serial_checker.bat
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Lunar spoofer.exe
-
Size
17.7MB
-
MD5
307c9c8d33c5e29dedbdfcefa76fb08f
-
SHA1
412d4dfde8ce9c5ae4cbaec828a7b7d75e9ca85e
-
SHA256
ee7be92913e679dd66d5a5a62cc8b78a4093da9344cce8ab7058fc8e6ea766c4
-
SHA512
278ecaace8468273c9ec6eb47f8435e31cb4525124dd9e0142f49e3825a23d5fcb95b4e9e17a74432c2f5dd3d9b736c4009f0d59d952ff0c01429416cb394245
-
SSDEEP
393216:gqPnLFXlrVgQpDOETgsvfGzugNsxqvEiA/IQGL7Sq:hPLFXN6QoEx2sZiykv
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
serial_checker.bat
-
Size
1KB
-
MD5
efa2cd30989448f5690130b07ccce86a
-
SHA1
0c3203f67c67cf63d39894a0577f20d5dc1427e8
-
SHA256
86710039b7414ff861ca629c839e89eb5eaf74cff86129734c575e5716c1a552
-
SHA512
c2f7dfb10f311ba6684651ca4e8aee8408e5abf6c2f564ce2764c0bac8df07da0b742bedff992d2ff9f6b00a1d6b1423d09390653c0fd0d47303984183db358e
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1