Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 01:28
Behavioral task
behavioral1
Sample
Trade_Up_Installer.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Trade_Up_Installer.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
Trade_Up_Installer.exe
-
Size
267KB
-
MD5
79835ddd9be57c924f3cb1012d5faf11
-
SHA1
9f91d7aba0d505fa35b911196381c3f247b74d2c
-
SHA256
52cfa28cbfd8fd8ccc937f0c531c6efb68de5a059f73217954e79f11abc47367
-
SHA512
a5da15f5ec43368a9fd5e405c150dfe0c027f9de52016176fd3b7f70e345d4c08493d7bbcb7537ff5b32bf7ee16f2f3e35a6752d0f649a01d14e45bb0962d525
-
SSDEEP
1536:NIxTgCZKHl4TBDwMPmXqKQfUjlWbOVoTvD+sFIA:NqTgSKllWS+jD+uI
Malware Config
Signatures
-
Detects RedTiger Stealer 7 IoCs
resource yara_rule behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp redtigerv122 behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp redtigerv22 behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp redtiger_stealer_detection behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp redtiger_stealer_detection_v2 behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp staticSred behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp staticred behavioral1/memory/2392-1-0x0000000000CD0000-0x0000000000D1A000-memory.dmp redtiger_stealer_detection_v1 -
Redtiger family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2740 2392 Trade_Up_Installer.exe 30 PID 2392 wrote to memory of 2740 2392 Trade_Up_Installer.exe 30 PID 2392 wrote to memory of 2740 2392 Trade_Up_Installer.exe 30