Resubmissions

30-12-2024 21:21

241230-z7skkaskdx 10

General

  • Target

    Setup.exe

  • Size

    13.9MB

  • Sample

    241230-z7skkaskdx

  • MD5

    ed5431fa054c82af3c8cceabf0cbd071

  • SHA1

    89034408ecf3c0ee53cb59ac1abf9144af381b36

  • SHA256

    9e26bac988acfb11c127496bac38db4aaceda542c4c9c33ba23417a340d7788c

  • SHA512

    19eff4a9dd446e1b4e45eafa151068ae1e6749abfbafcdb1a64d7718685a0ccdcff28c98491af536cc47da3d07953e082d92b24f86dd8d188127bee4d77d56e2

  • SSDEEP

    393216:MqPuYXJBx/m3pgDOEkSgsv9ot+Kc0WBD:9PuYXJBxKlAeru

Malware Config

Targets

    • Target

      Setup.exe

    • Size

      13.9MB

    • MD5

      ed5431fa054c82af3c8cceabf0cbd071

    • SHA1

      89034408ecf3c0ee53cb59ac1abf9144af381b36

    • SHA256

      9e26bac988acfb11c127496bac38db4aaceda542c4c9c33ba23417a340d7788c

    • SHA512

      19eff4a9dd446e1b4e45eafa151068ae1e6749abfbafcdb1a64d7718685a0ccdcff28c98491af536cc47da3d07953e082d92b24f86dd8d188127bee4d77d56e2

    • SSDEEP

      393216:MqPuYXJBx/m3pgDOEkSgsv9ot+Kc0WBD:9PuYXJBxKlAeru

    • Detects RedTiger Stealer

    • Redtiger family

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks