General

  • Target

    securelookup.exe.exe

  • Size

    102.5MB

  • Sample

    250104-wh4dzsslcp

  • MD5

    4865208982a2a067f80b6515ee5dbaa0

  • SHA1

    10f66ba07b10ed54981c34dd62a5390579c0f84e

  • SHA256

    90c0151c7285ea8519e3584b2916dc769ff31f47a64585b9752b0e76107ceb06

  • SHA512

    e1b5a156b8ca80ca967d862f3205ff3b4fa6bdbaf90260fe685294e55415d3ea6b8965bc4919d7cc6e1bd362162984636bf003970141360ada575eaa93fbfa0a

  • SSDEEP

    3145728:7V7pa8S6xjKcBa6c2qHO5iVY2nGQbRe0zJcBWSA49U:RVBSWNa6sHCiH1XcBWY

Malware Config

Targets

    • Target

      securelookup.exe.exe

    • Size

      102.5MB

    • MD5

      4865208982a2a067f80b6515ee5dbaa0

    • SHA1

      10f66ba07b10ed54981c34dd62a5390579c0f84e

    • SHA256

      90c0151c7285ea8519e3584b2916dc769ff31f47a64585b9752b0e76107ceb06

    • SHA512

      e1b5a156b8ca80ca967d862f3205ff3b4fa6bdbaf90260fe685294e55415d3ea6b8965bc4919d7cc6e1bd362162984636bf003970141360ada575eaa93fbfa0a

    • SSDEEP

      3145728:7V7pa8S6xjKcBa6c2qHO5iVY2nGQbRe0zJcBWSA49U:RVBSWNa6sHCiH1XcBWY

    • Detects RedTiger Stealer

    • Redtiger family

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks