Overview
overview
10Static
static
3MoonCrypte...ip.dll
windows7-x64
1MoonCrypte...ip.dll
windows10-2004-x64
1MoonCrypte...er.exe
windows7-x64
8MoonCrypte...er.exe
windows10-2004-x64
8MoonCrypte...32.dll
windows10-2004-x64
1MoonCrypte...ce.exe
windows7-x64
3MoonCrypte...ce.exe
windows10-2004-x64
1MoonCrypte...r1.exe
windows7-x64
10MoonCrypte...r1.exe
windows10-2004-x64
10MoonCrypte...32.dll
windows10-2004-x64
1MoonCrypte...r1.exe
windows7-x64
8MoonCrypte...r1.exe
windows10-2004-x64
8General
-
Target
MoonCrypter1.rar
-
Size
1.7MB
-
Sample
250124-24va4atkfv
-
MD5
760b8ccf814fde6524ceffc5f97421d8
-
SHA1
22d79221917fd211a42f923aa5a94ba72c749e75
-
SHA256
eda0f45bf7e42ea80b3140d490ffcdd773f35d48bcb4ee9babc76f67afd7b8f6
-
SHA512
41ddaee104d4bfad95686193564c4122dae026d5f3b86fb3fb536d09fc43301c306632bafb695c543b6cd3838bca080feecba23f75b46820e33e6df66724d3ea
-
SSDEEP
24576:sxO9XOv3bdt1fMY5LJgYOeD82y7UhPIsamtMQ1dVExVwYs5YDGrVEfHm16OUdo1U:IfbjEzezyC+srEzJJOEfg6OUPSR8T
Static task
static1
Behavioral task
behavioral1
Sample
MoonCrypter/Jint/Ionic.Zip.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MoonCrypter/Jint/Ionic.Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
MoonCrypter/Jint/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
MoonCrypter/Jint/Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
MoonCrypter/Jint/comctl32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
MoonCrypter/Jint/mce.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
MoonCrypter/Jint/mce.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
MoonCrypter/MoonCrypter1.exe
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
MoonCrypter/MoonCrypter1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
MoonCrypter/comctl32.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
MoonCrypter/fixer1.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
MoonCrypter/fixer1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
5.0
193.123.88.61:4444
1cAjmT6r87cbZXRe
-
Install_directory
%AppData%
-
install_file
host.exe
Targets
-
-
Target
MoonCrypter/Jint/Ionic.Zip.dll
-
Size
480KB
-
MD5
f6933bf7cee0fd6c80cdf207ff15a523
-
SHA1
039eeb1169e1defe387c7d4ca4021bce9d11786d
-
SHA256
17bb0c9be45289a2be56a5f5a68ec9891d7792b886e0054bc86d57fe84d01c89
-
SHA512
88675512daa41e17ce4daf6ca764ccb17cd9633a7c2b7545875089cae60f6918909a947f3b1692d16ec5fa209e18e84bc0ff3594f72c3e677a6cca9f3a70b8d6
-
SSDEEP
6144:OhagC/Mq25o9sXGtSV41OJDsTDDVUMle6ZjxLV/kHu4Bht79I9:iagxWS4msNUCe65fkHdBf9
Score1/10 -
-
-
Target
MoonCrypter/Jint/Launcher.exe
-
Size
53KB
-
MD5
c6d4c881112022eb30725978ecd7c6ec
-
SHA1
ba4f96dc374195d873b3eebdb28b633d9a1c5bf5
-
SHA256
0d87b9b141a592711c52e7409ec64de3ab296cddc890be761d9af57cea381b32
-
SHA512
3bece10b65dfda69b6defbf50d067a59d1cd1db403547fdf28a4cbc87c4985a4636acfcff8300bd77fb91f2693084634d940a91517c33b5425258835ab990981
-
SSDEEP
768:FKtnBTTQi/YqMFlVt52ftDhKeoNzZq8OujxUu5XEAb4b9yvMzUV5:qBTUgYFveDRuFEAb4b99QV5
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
MoonCrypter/Jint/comctl32.dll
-
Size
657KB
-
MD5
384d0d60981557b675e0ea94ece3ab26
-
SHA1
2ebabc7a4a3f36041d92cf91b72957e77fe1c190
-
SHA256
153dc459a73e102f60e62162f21b40f2cf666a9039b69d84df3cffb1eeedef66
-
SHA512
71f676c5d06d00d9ca24de52387fdc4791d7ff54f6da64f97381a34759883eaa59b6c6f76afdbd8c571723328b8bc4b9e15568b53f0f258a704cceba9f5630e3
-
SSDEEP
12288:1+eBYBiTZjaXU8iXmXQ4rETlrCY8QTBGsQi50NpchRW7wZ4fwID:1+eMXXlyuQ4rEZR8WBii50b3w8
Score1/10 -
-
-
Target
MoonCrypter/Jint/mce.exe
-
Size
253KB
-
MD5
0ec3da715b4dd0c38c00d5102dbcc6c6
-
SHA1
8f94bdd39e48e894d01cc418059288ab0b9fd7ce
-
SHA256
cd24da6a58712ffa1c42790226d2dbcbd4a223e14d001c97e4031170d3ef6a99
-
SHA512
a3b9aff7c374accb0d079104bbf73889c8b0c9c14cbabbf97265048c944efb89cc5b9340fab8e80607e8863d32cec6908d01d079414c4bc69a09301485464232
-
SSDEEP
3072:/kTP5ZkDO0Yb95ks/sptHfLOcHiCeiRHfdhTW4ks/sptHfLO:YRZkoQBtDDQBtD
Score3/10 -
-
-
Target
MoonCrypter/MoonCrypter1.exe
-
Size
582KB
-
MD5
fe33fb1a059475fe19f07437098c391c
-
SHA1
bf4a0cc782156a44a27c7e9ea1e4297be926a597
-
SHA256
fc70565765ef8ca0f63b63aab261ebff53d1f110bd8da460720099b779832283
-
SHA512
c8117a6cd0e956d2ff82143621a320ebf7ff38f67a4cb64f9e294c341806757a4a0549e869c16d90c0d48ebd6262befd62411af9cacc19121b25ee5532e6d079
-
SSDEEP
12288:2zvRCmaURtTLYscOOn37xZOSKrUwgQbBcg0Mp2egI:E0UtnYb3T5ONgwcg06DgI
-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
MoonCrypter/comctl32.dll
-
Size
657KB
-
MD5
384d0d60981557b675e0ea94ece3ab26
-
SHA1
2ebabc7a4a3f36041d92cf91b72957e77fe1c190
-
SHA256
153dc459a73e102f60e62162f21b40f2cf666a9039b69d84df3cffb1eeedef66
-
SHA512
71f676c5d06d00d9ca24de52387fdc4791d7ff54f6da64f97381a34759883eaa59b6c6f76afdbd8c571723328b8bc4b9e15568b53f0f258a704cceba9f5630e3
-
SSDEEP
12288:1+eBYBiTZjaXU8iXmXQ4rETlrCY8QTBGsQi50NpchRW7wZ4fwID:1+eMXXlyuQ4rEZR8WBii50b3w8
Score1/10 -
-
-
Target
MoonCrypter/fixer1.exe
-
Size
510KB
-
MD5
696be443d22e8435a3649313ce100c66
-
SHA1
3213e88a7accb1002f67770f3f972fb19f2da7de
-
SHA256
1f7561c08f10f443c953fe4292bbc3e69e739f9c61e426fba4c210de423f1ddb
-
SHA512
b15e57b35cd7ea49b288103a327cd7fce80494f05d048b9ae909647f5f4f3acbb4b25495e48375bf6f7191f39b7dd941a098a914d281687847996c37a288424d
-
SSDEEP
12288:jY5yIaKqe+ys/755QzLBH8oAfZsZpp2egI:wyIaKqzys/7kmoAfiHDgI
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-