General

  • Target

    49b95125c630577467706d3b5104b2c9652d0df4a3e73b1f890dc5534364eb14N.exe

  • Size

    45KB

  • Sample

    240925-evf1saxfqf

  • MD5

    822addd81633611e7435a11ae74b6850

  • SHA1

    cdf1c066c28b957b2f91db8741d509be56358f9d

  • SHA256

    49b95125c630577467706d3b5104b2c9652d0df4a3e73b1f890dc5534364eb14

  • SHA512

    ef0d4bebb299a375622feb4c0e5fd2a2d99a6ba6b25653f2025cc1b56eb3e2e7d490fa5ed6f6d45afaf3df006f6ed2ebc5a0b249931db8e3f2e6b499d805ccc3

  • SSDEEP

    768:4hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:EsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      49b95125c630577467706d3b5104b2c9652d0df4a3e73b1f890dc5534364eb14N.exe

    • Size

      45KB

    • MD5

      822addd81633611e7435a11ae74b6850

    • SHA1

      cdf1c066c28b957b2f91db8741d509be56358f9d

    • SHA256

      49b95125c630577467706d3b5104b2c9652d0df4a3e73b1f890dc5534364eb14

    • SHA512

      ef0d4bebb299a375622feb4c0e5fd2a2d99a6ba6b25653f2025cc1b56eb3e2e7d490fa5ed6f6d45afaf3df006f6ed2ebc5a0b249931db8e3f2e6b499d805ccc3

    • SSDEEP

      768:4hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:EsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks