General
-
Target
securelookup.exe.exe
-
Size
102.5MB
-
Sample
250104-wh4dzsslcp
-
MD5
4865208982a2a067f80b6515ee5dbaa0
-
SHA1
10f66ba07b10ed54981c34dd62a5390579c0f84e
-
SHA256
90c0151c7285ea8519e3584b2916dc769ff31f47a64585b9752b0e76107ceb06
-
SHA512
e1b5a156b8ca80ca967d862f3205ff3b4fa6bdbaf90260fe685294e55415d3ea6b8965bc4919d7cc6e1bd362162984636bf003970141360ada575eaa93fbfa0a
-
SSDEEP
3145728:7V7pa8S6xjKcBa6c2qHO5iVY2nGQbRe0zJcBWSA49U:RVBSWNa6sHCiH1XcBWY
Behavioral task
behavioral1
Sample
securelookup.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
securelookup.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
securelookup.exe.exe
-
Size
102.5MB
-
MD5
4865208982a2a067f80b6515ee5dbaa0
-
SHA1
10f66ba07b10ed54981c34dd62a5390579c0f84e
-
SHA256
90c0151c7285ea8519e3584b2916dc769ff31f47a64585b9752b0e76107ceb06
-
SHA512
e1b5a156b8ca80ca967d862f3205ff3b4fa6bdbaf90260fe685294e55415d3ea6b8965bc4919d7cc6e1bd362162984636bf003970141360ada575eaa93fbfa0a
-
SSDEEP
3145728:7V7pa8S6xjKcBa6c2qHO5iVY2nGQbRe0zJcBWSA49U:RVBSWNa6sHCiH1XcBWY
Score10/10-
Detects RedTiger Stealer
-
Redtiger family
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-