Analysis
-
max time kernel
13s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:38
Behavioral task
behavioral1
Sample
hwid_1.exe
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
hwid_1.exe
-
Size
2.2MB
-
MD5
55ba1c985f2b0393c86d043960d8c5a0
-
SHA1
3abec7f9ea28e6563d60defc672da13b5d6e8192
-
SHA256
f4f27716416e99523a7f18786d5035bf50052b76444c9e769a34acd152318533
-
SHA512
28b8eb1e5929652cb54e3cbc30bd33b85639047b30b4bf99fcb5180e12f7268223bddfaed46898453199aa119067036621ff32fac9b43aa950f2e5359d8707a4
-
SSDEEP
49152:bNJCFJXsq8AQLZY7seDNKTtBfqz8pLP1Z+tbPmuAjW2NqjeDf/0hfJ:vCFJXsqTNDIBi8pL/+NUjZqCb/0j
Malware Config
Signatures
-
Detects RedTiger Stealer 14 IoCs
resource yara_rule behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtigerv122 behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtigerv22 behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtiger_stealer_detection behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtiger_stealer_detection_v2 behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp staticSred behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp staticred behavioral1/memory/1176-0-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtiger_stealer_detection_v1 behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtigerv122 behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtigerv22 behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtiger_stealer_detection behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtiger_stealer_detection_v2 behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp staticSred behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp staticred behavioral1/memory/1176-3-0x000000013F5F0000-0x000000013FC13000-memory.dmp redtiger_stealer_detection_v1 -
Redtiger family
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion hwid_1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion hwid_1.exe