General

  • Target

    7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N

  • Size

    160KB

  • Sample

    241022-ws1qvazfrr

  • MD5

    7ff1ab6162b4c035b8a1f9327e1e43c0

  • SHA1

    e25c6d31d092a310aa8a9f67dcc2d03270735507

  • SHA256

    7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60

  • SHA512

    ba5dcfeb503d300e2314aeb249c67556c7c8b2f8b9fadd7cb48b421aaece914a6b8861cc16885d9a6554cab98c883c4efc0e83cf30559f663d9fc4851b67a3f6

  • SSDEEP

    1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60N

    • Size

      160KB

    • MD5

      7ff1ab6162b4c035b8a1f9327e1e43c0

    • SHA1

      e25c6d31d092a310aa8a9f67dcc2d03270735507

    • SHA256

      7fbef39558e3963e795019639342a2717801919032d97880a11303ff4d47cf60

    • SHA512

      ba5dcfeb503d300e2314aeb249c67556c7c8b2f8b9fadd7cb48b421aaece914a6b8861cc16885d9a6554cab98c883c4efc0e83cf30559f663d9fc4851b67a3f6

    • SSDEEP

      1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks