Resubmissions

13-01-2025 11:30

250113-nmm9kaspgm 10

12-01-2025 22:38

250112-2kh4qasphw 10

General

  • Target

    final.exe

  • Size

    28.5MB

  • Sample

    250112-2kh4qasphw

  • MD5

    0e8ac8c96394c6a523f41e10788dd32d

  • SHA1

    f5d5e6f86f5f12d25d3813406239341e19e2f4b4

  • SHA256

    d765f74af0a7e3986616b3018fd6190bd389458dcd408f208cb34072ef4eef12

  • SHA512

    8a7ff55f0232fe1fbd4b860f82835cf7e1b7ce9d9bc6dcaad92670e811fa599fbb29b9d902db516d9c512a283168d0f71cfe458cd707d0553748adade954c7d4

  • SSDEEP

    786432:S9Yidh5ngiRW8jjYEA8h1QtIea8DZcUTJl8+Q5++PbmSkytWx04MDIy:S9J5ngwWi8sviIv61ox+Sb5k8Wx04R

Malware Config

Targets

    • Target

      final.exe

    • Size

      28.5MB

    • MD5

      0e8ac8c96394c6a523f41e10788dd32d

    • SHA1

      f5d5e6f86f5f12d25d3813406239341e19e2f4b4

    • SHA256

      d765f74af0a7e3986616b3018fd6190bd389458dcd408f208cb34072ef4eef12

    • SHA512

      8a7ff55f0232fe1fbd4b860f82835cf7e1b7ce9d9bc6dcaad92670e811fa599fbb29b9d902db516d9c512a283168d0f71cfe458cd707d0553748adade954c7d4

    • SSDEEP

      786432:S9Yidh5ngiRW8jjYEA8h1QtIea8DZcUTJl8+Q5++PbmSkytWx04MDIy:S9J5ngwWi8sviIv61ox+Sb5k8Wx04R

    • Detects RedTiger Stealer

    • Lunagrabber family

    • Matches Luna Grabber Rule For Entry

      Detects behavior indicative of Luna Grabber malware

    • Modifies Windows Defender Real-time Protection settings

    • Redtiger family

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Drops file in Drivers directory

    • Possible privilege escalation attempt

    • Drops startup file

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks