General
-
Target
Lunacy.exe
-
Size
65.5MB
-
Sample
250112-r7rdhawqdz
-
MD5
a8604ed6963fbd500f7ddbdc2974087f
-
SHA1
711ee4517ba5057b3f2b77f353bc5baf8907d3ee
-
SHA256
fad34259cb3d3755be673a6d68b260410886c8a331d521cce755f5c2b901c266
-
SHA512
33fe9b16210bdc68d4bc98a66886f9792d089ec71c21a707ae53a62bf558e910022f11d82d5bb72801b67bb3d90179e433bd2734942b5458835f71b4e4deeea3
-
SSDEEP
1572864:mDrVnCeLskhmYGTltzFsz33Us7MCnp70KGnfHlD86dqyVr:0rAeLnpGTlKd7MCnp70BfHq6dNVr
Static task
static1
Behavioral task
behavioral1
Sample
Lunacy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Lunacy.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Extracted
discordrat
-
discord_token
MTMyNjI3MzE5MjI2MzY4NDE1Nw.GqZTXC.3wU7sojPUYgFVOMUMGVxSZ4fuH7Ie5zAU4zEQE
-
server_id
1325932201975484416
Targets
-
-
Target
Lunacy.exe
-
Size
65.5MB
-
MD5
a8604ed6963fbd500f7ddbdc2974087f
-
SHA1
711ee4517ba5057b3f2b77f353bc5baf8907d3ee
-
SHA256
fad34259cb3d3755be673a6d68b260410886c8a331d521cce755f5c2b901c266
-
SHA512
33fe9b16210bdc68d4bc98a66886f9792d089ec71c21a707ae53a62bf558e910022f11d82d5bb72801b67bb3d90179e433bd2734942b5458835f71b4e4deeea3
-
SSDEEP
1572864:mDrVnCeLskhmYGTltzFsz33Us7MCnp70KGnfHlD86dqyVr:0rAeLnpGTlKd7MCnp70BfHq6dNVr
-
Discordrat family
-
Lumma family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-