General

  • Target

    26e1b1bdf59a3dc3ff7d5b955fa9438b5b81332228673ffdfea1feb614dd65b4N

  • Size

    160KB

  • Sample

    241001-bja4lstbrr

  • MD5

    a56a3a276b1bc91a0f189421aa3f6690

  • SHA1

    4aae692053a580dbaadddf9038c1263a01500c9f

  • SHA256

    26e1b1bdf59a3dc3ff7d5b955fa9438b5b81332228673ffdfea1feb614dd65b4

  • SHA512

    41bfdb03caff81fb3ad7e974a988830a99bc5da40ce8fe4e0b1b4662a16980e29638e4381c60b1016c494a8d812daedf280668ff4e0569004fda5620162ff336

  • SSDEEP

    1536:pEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:iY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      26e1b1bdf59a3dc3ff7d5b955fa9438b5b81332228673ffdfea1feb614dd65b4N

    • Size

      160KB

    • MD5

      a56a3a276b1bc91a0f189421aa3f6690

    • SHA1

      4aae692053a580dbaadddf9038c1263a01500c9f

    • SHA256

      26e1b1bdf59a3dc3ff7d5b955fa9438b5b81332228673ffdfea1feb614dd65b4

    • SHA512

      41bfdb03caff81fb3ad7e974a988830a99bc5da40ce8fe4e0b1b4662a16980e29638e4381c60b1016c494a8d812daedf280668ff4e0569004fda5620162ff336

    • SSDEEP

      1536:pEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:iY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks