General

  • Target

    658a0c326235f23431f130766e1fbde76caa857c5ccc2720617deed53e39b8b8N

  • Size

    160KB

  • Sample

    241002-bq5lsszenn

  • MD5

    002748c16a03811c0a4268239394be70

  • SHA1

    722eb218cd45bcd241c1fc28305d61efde9544e3

  • SHA256

    658a0c326235f23431f130766e1fbde76caa857c5ccc2720617deed53e39b8b8

  • SHA512

    11a6df24b8818a69b8b90cc38f3c654450cfd3f23f997a35e42dda774cce48f73888b85f05556b53625f65699aa7ace0ffd546ab4e259a679b8aff0877bd96f5

  • SSDEEP

    1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:TY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      658a0c326235f23431f130766e1fbde76caa857c5ccc2720617deed53e39b8b8N

    • Size

      160KB

    • MD5

      002748c16a03811c0a4268239394be70

    • SHA1

      722eb218cd45bcd241c1fc28305d61efde9544e3

    • SHA256

      658a0c326235f23431f130766e1fbde76caa857c5ccc2720617deed53e39b8b8

    • SHA512

      11a6df24b8818a69b8b90cc38f3c654450cfd3f23f997a35e42dda774cce48f73888b85f05556b53625f65699aa7ace0ffd546ab4e259a679b8aff0877bd96f5

    • SSDEEP

      1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:TY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks