Overview
overview
10Static
static
10MoonSteale...er.exe
windows7-x64
10MoonSteale...er.exe
windows10-2004-x64
10MoonSteale...px.exe
windows7-x64
5MoonSteale...px.exe
windows10-2004-x64
5out.exe
windows7-x64
out.exe
windows10-2004-x64
MoonSteale...der.py
windows7-x64
3MoonSteale...der.py
windows10-2004-x64
3MoonSteale...ll.bat
windows7-x64
10MoonSteale...ll.bat
windows10-2004-x64
10MoonSteale...ain.py
windows7-x64
3MoonSteale...ain.py
windows10-2004-x64
3MoonSteale...rt.bat
windows7-x64
1MoonSteale...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31/01/2025, 04:36
Behavioral task
behavioral1
Sample
MoonStealer-main/MoonStealer_assets/upx/updater.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MoonStealer-main/MoonStealer_assets/upx/updater.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
MoonStealer-main/MoonStealer_assets/upx/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
MoonStealer-main/MoonStealer_assets/upx/upx.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
MoonStealer-main/builder.py
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
MoonStealer-main/builder.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
MoonStealer-main/install.bat
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
MoonStealer-main/install.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
MoonStealer-main/main.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
MoonStealer-main/main.py
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
MoonStealer-main/start.bat
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
MoonStealer-main/start.bat
Resource
win10v2004-20241007-en
General
-
Target
MoonStealer-main/builder.py
-
Size
6KB
-
MD5
48d51f59c5177750328641c797c0f478
-
SHA1
618ccea3f2ae5e435430e779579f9cd2c84c1dd2
-
SHA256
8d84f48da564d51a2ca621554179e82f9bf12ca5db097977a2146b373c6fad32
-
SHA512
918ff4b93338e9c75542b04c3bd1ba12b5562660d64eca679e9bc782bf8a81ea31efdfa779e270a96f2da641e694a86a0e0d433d9bfb95c70bd72d3051396ead
-
SSDEEP
96:SFvQsZlbpdIV9ll+zVHJllFSYUCSPlbpdIV1ll+zVHRllFiYbRZfY7DGZ2we8Gzo:IZlbpd8QztMPlbpd8IztbZf0GZzjv4A7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2760 AcroRd32.exe 2760 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2104 1276 cmd.exe 31 PID 1276 wrote to memory of 2104 1276 cmd.exe 31 PID 1276 wrote to memory of 2104 1276 cmd.exe 31 PID 2104 wrote to memory of 2760 2104 rundll32.exe 32 PID 2104 wrote to memory of 2760 2104 rundll32.exe 32 PID 2104 wrote to memory of 2760 2104 rundll32.exe 32 PID 2104 wrote to memory of 2760 2104 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MoonStealer-main\builder.py1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MoonStealer-main\builder.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MoonStealer-main\builder.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56880ba5f068949dbd663476d665885fd
SHA15417631ee5fb362a91c076cc8fe7c7d30bc6636b
SHA256af4de6813e2c01e564c4a30f852cdefde0738c553ead77aa174f4ddd8c06d6dd
SHA51241883e5acca161123aeed2a86b2e09c32f46125064ce5554910f447a41f81ba11ddd552638bb8f31b8300c7679e946bd6e7aab90e4fc34c40b757687a42249f8