General

  • Target

    04ff01feb49ca136367fb5f31da40245411af145246a221f0ab6f1177fe8046bN.exe

  • Size

    89KB

  • Sample

    240926-cv9xrasarq

  • MD5

    511e64f03ddfbca41996b7741dfc1be0

  • SHA1

    c37a7e287d71769a32eb51e3336fd45e5dbe062b

  • SHA256

    04ff01feb49ca136367fb5f31da40245411af145246a221f0ab6f1177fe8046b

  • SHA512

    f991dc1f6cd2335dad03b2d3cb96a16b3e4295011aee22433f2c957c0c1cd9a6fd3e36dd97be5f4a3460e678cb2f026abb5be666db017776f774c8f6765da6bf

  • SSDEEP

    1536:t1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:v+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      04ff01feb49ca136367fb5f31da40245411af145246a221f0ab6f1177fe8046bN.exe

    • Size

      89KB

    • MD5

      511e64f03ddfbca41996b7741dfc1be0

    • SHA1

      c37a7e287d71769a32eb51e3336fd45e5dbe062b

    • SHA256

      04ff01feb49ca136367fb5f31da40245411af145246a221f0ab6f1177fe8046b

    • SHA512

      f991dc1f6cd2335dad03b2d3cb96a16b3e4295011aee22433f2c957c0c1cd9a6fd3e36dd97be5f4a3460e678cb2f026abb5be666db017776f774c8f6765da6bf

    • SSDEEP

      1536:t1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:v+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks