Overview
overview
10Static
static
3Lunacy.exe
windows7-x64
10Lunacy.exe
windows10-2004-x64
10Lunacy.exe
android-9-x86
Lunacy.exe
android-10-x64
Lunacy.exe
android-11-x64
Lunacy.exe
macos-10.15-amd64
Lunacy.exe
ubuntu-18.04-amd64
Lunacy.exe
debian-9-armhf
Lunacy.exe
debian-9-mips
Lunacy.exe
debian-9-mipsel
General
-
Target
Lunacy.exe
-
Size
65.5MB
-
Sample
250113-epekrsxnhj
-
MD5
a8604ed6963fbd500f7ddbdc2974087f
-
SHA1
711ee4517ba5057b3f2b77f353bc5baf8907d3ee
-
SHA256
fad34259cb3d3755be673a6d68b260410886c8a331d521cce755f5c2b901c266
-
SHA512
33fe9b16210bdc68d4bc98a66886f9792d089ec71c21a707ae53a62bf558e910022f11d82d5bb72801b67bb3d90179e433bd2734942b5458835f71b4e4deeea3
-
SSDEEP
1572864:mDrVnCeLskhmYGTltzFsz33Us7MCnp70KGnfHlD86dqyVr:0rAeLnpGTlKd7MCnp70BfHq6dNVr
Static task
static1
Behavioral task
behavioral1
Sample
Lunacy.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Lunacy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Lunacy.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
Lunacy.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
Lunacy.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
Lunacy.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
Lunacy.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
Lunacy.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
Lunacy.exe
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral10
Sample
Lunacy.exe
Resource
debian9-mipsel-20240226-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyNjI3MzE5MjI2MzY4NDE1Nw.GqZTXC.3wU7sojPUYgFVOMUMGVxSZ4fuH7Ie5zAU4zEQE
-
server_id
1325932201975484416
Extracted
lumma
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
Targets
-
-
Target
Lunacy.exe
-
Size
65.5MB
-
MD5
a8604ed6963fbd500f7ddbdc2974087f
-
SHA1
711ee4517ba5057b3f2b77f353bc5baf8907d3ee
-
SHA256
fad34259cb3d3755be673a6d68b260410886c8a331d521cce755f5c2b901c266
-
SHA512
33fe9b16210bdc68d4bc98a66886f9792d089ec71c21a707ae53a62bf558e910022f11d82d5bb72801b67bb3d90179e433bd2734942b5458835f71b4e4deeea3
-
SSDEEP
1572864:mDrVnCeLskhmYGTltzFsz33Us7MCnp70KGnfHlD86dqyVr:0rAeLnpGTlKd7MCnp70BfHq6dNVr
-
Discordrat family
-
Lumma family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-