General
-
Target
https://lunita-2d.github.io/
-
Sample
250115-vxvjys1kdl
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://lunita-2d.github.io/
Resource
win10ltsc2021-20250113-en
23 signatures
150 seconds
Malware Config
Targets
-
-
Target
https://lunita-2d.github.io/
-
Enumerates VirtualBox DLL files
-
Looks for VirtualBox drivers on disk
-
Looks for VirtualBox executables on disk
-
Looks for VMWare drivers on disk
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1