General
-
Target
Luna-Grabber-Main-main.zip
-
Size
19.6MB
-
Sample
250306-2n6desznt8
-
MD5
266942919795bf1bd4942fd71871da92
-
SHA1
7e091b2465d2e50875128a1aa9e921fb6c65db40
-
SHA256
6aceeac6f374351f34b9cd3fa36198ca5b6835b83f8c8433fcfd1c2ffb13a6b3
-
SHA512
0f655c688a4a3e9cac8b2204cba412c66335876f53988dd2408b99cd2aa4f75c8296f8e6ee3f87aecbb3e044340b483dd74f595901b30c4026762b798309b86e
-
SSDEEP
393216:1h6KmqySo7UsqhG3US2et9XbPOs7HbALhdvItm7MWDDg5q+:TTmqySow3G3US2enPOpzGWV+
Behavioral task
behavioral1
Sample
Luna-Grabber-Main-main/builder.exe
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
Luna-Grabber-Main-main/builder.exe
-
Size
19.8MB
-
MD5
95419e62271175d0d3b3306b0befffb3
-
SHA1
e5a126c4d582372385212d804658056651599d95
-
SHA256
394a76cae20c6d644a5f9a12099b48ee2058f6b03ff3f83805bb5d078248cb8c
-
SHA512
5d2de343eb27d2bc471f7368debe98665c07a3a1a79ab2e2b084312f807db07697aa3f3a79b1b683c54b364020f012f812a8018fecf08419011f6945da4771bf
-
SSDEEP
393216:MQtstvdqJr7M5liAdQJlOwF3MnG3otl5cGaABo1edW3zCd1Z5Z:MQtstVA7M5lndQD3MGYNjbCOf
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3