General
-
Target
tri.rar
-
Size
17.5MB
-
Sample
241201-nw2tbazrfy
-
MD5
48fd699e9cba54f5c9fb09a3d362aedf
-
SHA1
f130049b001902d7fcad58f13d6b47f0d055acca
-
SHA256
4ee66020bf8fd5606f1fa1835a6c2328aab1556035e44a2de60b87c8f8571375
-
SHA512
7e80794fb6d765ef42236c4fa16a53f817df2a163e944a31513344c1d74379a1ca5df02eafd188294c65b39c47db7d748c30de58ae95693bf161216bcb67e6a8
-
SSDEEP
393216:1vAMSV/Hy1IrjMr8wyVQvm21KpM1pfWbQVjxm3rYR:1oPyOkwBCpK6WsVtm3rC
Behavioral task
behavioral1
Sample
tri.rar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Lunar spoofer.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
read me.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
serial_checker.bat
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
tri.rar
-
Size
17.5MB
-
MD5
48fd699e9cba54f5c9fb09a3d362aedf
-
SHA1
f130049b001902d7fcad58f13d6b47f0d055acca
-
SHA256
4ee66020bf8fd5606f1fa1835a6c2328aab1556035e44a2de60b87c8f8571375
-
SHA512
7e80794fb6d765ef42236c4fa16a53f817df2a163e944a31513344c1d74379a1ca5df02eafd188294c65b39c47db7d748c30de58ae95693bf161216bcb67e6a8
-
SSDEEP
393216:1vAMSV/Hy1IrjMr8wyVQvm21KpM1pfWbQVjxm3rYR:1oPyOkwBCpK6WsVtm3rC
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Lunar spoofer.exe
-
Size
17.7MB
-
MD5
307c9c8d33c5e29dedbdfcefa76fb08f
-
SHA1
412d4dfde8ce9c5ae4cbaec828a7b7d75e9ca85e
-
SHA256
ee7be92913e679dd66d5a5a62cc8b78a4093da9344cce8ab7058fc8e6ea766c4
-
SHA512
278ecaace8468273c9ec6eb47f8435e31cb4525124dd9e0142f49e3825a23d5fcb95b4e9e17a74432c2f5dd3d9b736c4009f0d59d952ff0c01429416cb394245
-
SSDEEP
393216:gqPnLFXlrVgQpDOETgsvfGzugNsxqvEiA/IQGL7Sq:hPLFXN6QoEx2sZiykv
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
8520638ea1de26a39485ef194f21d2d9
-
SHA1
38a3cf1e726c90ca907bd4e88b4e1c410039639d
-
SHA256
5d5bca522b2ee14d11631b91a78f823988aed232b6e0aa6f3f7f107d38eefdab
-
SHA512
3c89a9d757acead75e1c6582f27f82b06d33d7cbc5916def26c5f03610508508598b4bc88b092afb9427a071b062cd5cfc833c19e6f1e9840df5ab94a893a82c
-
SSDEEP
192:w5UjGWD8civfWdXwT8N2J8WMJhwZhJUMdwiBnw:oPWunpA2ZhaP8w
Score3/10 -
-
-
Target
read me.txt
-
Size
41B
-
MD5
83c53c59428011fe02c705c27d7ff228
-
SHA1
573f22ba205cd2c4f7eef788a2d422a6e3cc86fd
-
SHA256
8fd8346058823f62a0516283250751ef804fe7b89c7f3a7f40bf52adc4cf424d
-
SHA512
fb44cb38ddf500fa35b742636ff51ac40995406429fa5aaae4475b7dfc93ad955099638e8f8d5b0d5f1d6a39e05eb11052267789786af1f4566099df259fc881
Score1/10 -
-
-
Target
serial_checker.bat
-
Size
1KB
-
MD5
efa2cd30989448f5690130b07ccce86a
-
SHA1
0c3203f67c67cf63d39894a0577f20d5dc1427e8
-
SHA256
86710039b7414ff861ca629c839e89eb5eaf74cff86129734c575e5716c1a552
-
SHA512
c2f7dfb10f311ba6684651ca4e8aee8408e5abf6c2f564ce2764c0bac8df07da0b742bedff992d2ff9f6b00a1d6b1423d09390653c0fd0d47303984183db358e
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1