General

  • Target

    a7e19d6fcb9ffe9ea0e40ebca36d1777fc6a6bb522be5f90b7fd7b9502a6715aN.exe

  • Size

    45KB

  • Sample

    240924-16cy6aycpr

  • MD5

    4fb46585641257f17fd53dafc3f14ec0

  • SHA1

    2dd93b296d672b1692bc44af0bdaa661c7e597e3

  • SHA256

    a7e19d6fcb9ffe9ea0e40ebca36d1777fc6a6bb522be5f90b7fd7b9502a6715a

  • SHA512

    796a6d867b8ac57b85815cc509e27c64271f8dddc6e5d366afc3a7da7c752f6dbcb369909d32ca510faa48bbdd2154230c5c9e4f0229420992595c2bf7d9c0b3

  • SSDEEP

    768:IhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:0sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      a7e19d6fcb9ffe9ea0e40ebca36d1777fc6a6bb522be5f90b7fd7b9502a6715aN.exe

    • Size

      45KB

    • MD5

      4fb46585641257f17fd53dafc3f14ec0

    • SHA1

      2dd93b296d672b1692bc44af0bdaa661c7e597e3

    • SHA256

      a7e19d6fcb9ffe9ea0e40ebca36d1777fc6a6bb522be5f90b7fd7b9502a6715a

    • SHA512

      796a6d867b8ac57b85815cc509e27c64271f8dddc6e5d366afc3a7da7c752f6dbcb369909d32ca510faa48bbdd2154230c5c9e4f0229420992595c2bf7d9c0b3

    • SSDEEP

      768:IhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:0sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks