General

  • Target

    ed7293a62d162e135aff65be4577c2efa1cbf804f31b7b302dddd18cce800f11.exe

  • Size

    160KB

  • Sample

    241122-z1afeayqgy

  • MD5

    0d51aec20f323b28697a29032869aa96

  • SHA1

    0c7696144ad69b86f7688ce4eccd0becaef09cb2

  • SHA256

    ed7293a62d162e135aff65be4577c2efa1cbf804f31b7b302dddd18cce800f11

  • SHA512

    7982902ac8f90fdbe678f35e0b71146ad89a5467a819d52c22f729c05b58698359e2539b0798f8cb74914bdb0b0d4beeaefd9a6d7b83302553f64e343fe07843

  • SSDEEP

    1536:PEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:8Y+4MiIkLZJNAQ9J6v6

Malware Config

Targets

    • Target

      ed7293a62d162e135aff65be4577c2efa1cbf804f31b7b302dddd18cce800f11.exe

    • Size

      160KB

    • MD5

      0d51aec20f323b28697a29032869aa96

    • SHA1

      0c7696144ad69b86f7688ce4eccd0becaef09cb2

    • SHA256

      ed7293a62d162e135aff65be4577c2efa1cbf804f31b7b302dddd18cce800f11

    • SHA512

      7982902ac8f90fdbe678f35e0b71146ad89a5467a819d52c22f729c05b58698359e2539b0798f8cb74914bdb0b0d4beeaefd9a6d7b83302553f64e343fe07843

    • SSDEEP

      1536:PEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:8Y+4MiIkLZJNAQ9J6v6

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks