MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9b4c37e3e994ad0222740e4c51dae48cc415957f8ad066da25e977e5031fa374. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedTigerStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 10 File information Comments

SHA256 hash: 9b4c37e3e994ad0222740e4c51dae48cc415957f8ad066da25e977e5031fa374
SHA3-384 hash: e68a54f57939877f6f3914dc3cf8e155262c2f2319e187f9ea58033483005e438a174c92cfcaadd9a4a162c64266a9db
SHA1 hash: 55cd068a478757feb7893c6c1ce8554afe2936d2
MD5 hash: ada43a2845730532bd8586b5ed5e3c39
humanhash: speaker-winter-texas-muppet
File name:weird ass code i got sent.py
Download: download sample
Signature RedTigerStealer
File size:193'155 bytes
First seen:2025-09-09 02:02:36 UTC
Last seen:Never
File type:
MIME type:text/x-script.python
ssdeep 3072:vhxsLM7HMpOGR7jvnc56fbzCCOR7ekC8muzuohM2:ZxByOA9fbzCC8muzDr
TLSH T13814AE53DD920C5BA271D7A88D158649F7274F2326458E237BBC96021FBC83262F5F8E
Magika python
Reporter Anonymous
Tags:discord keylogger malware py RedTigerStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
80
Origin country :
DK DK
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
stealer virus tiger
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint python stealer
Verdict:
Malicious
File Type:
text
First seen:
2025-09-09T03:06:00Z UTC
Last seen:
2025-09-09T03:06:00Z UTC
Hits:
~10
Detections:
Trojan-PSW.Win32.Coins.sb HEUR:Trojan-PSW.Python.Agent.gen Trojan-PSW.Win32.Disco.sb
Gathering data
Threat name:
Script-Python.Trojan.RedTiger
Status:
Malicious
First seen:
2025-09-09 05:11:27 UTC
File Type:
Text (Python)
AV detection:
9 of 38 (23.68%)
Threat level:
  5/5
Result
Malware family:
redtiger_stealer
Score:
  10/10
Tags:
family:redtiger_stealer
Behaviour
Modifies registry class
Suspicious use of SetWindowsHookEx
Enumerates physical storage devices
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Base64_decoding
Author:iam-py-test
Description:Detect scripts which are decoding base64 encoded data (mainly Python, may apply to other languages)
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:virustotal
Author:Tracel
Rule name:WIN_WebSocket_Base64_C2_20250726
Author:dogsafetyforeverone
Description:Detects configuration strings used by malware to specify WebSocket command-and-control endpoints inside Base64-encoded data. It looks for prefixes such as '#ws://' or '#wss://' that were found in QuasarRAT configuration data.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments