General

  • Target

    7f3e474588bb41a571bfa13916fdf76d6fba54da4e7d2f010490067bea2f6d5b.exe

  • Size

    45KB

  • Sample

    241126-rck81azrcl

  • MD5

    00498decc7d48bbadca86283494b2396

  • SHA1

    247e02f5ff2ef72d2ebe9232c449a3ed1a500250

  • SHA256

    7f3e474588bb41a571bfa13916fdf76d6fba54da4e7d2f010490067bea2f6d5b

  • SHA512

    931c18658a735b237849dc2a9cf6d3bcf44a7376a8b5175e18d1b2bd5e58ee4dd3c2de9bbebb58751099fbb50853db7f7f91a9ea8351a301ff5fc8f244cd6f32

  • SSDEEP

    768:JhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2N:TsWE9N5dFu53dsniQaB/xZ14n7zIF+qx

Malware Config

Targets

    • Target

      7f3e474588bb41a571bfa13916fdf76d6fba54da4e7d2f010490067bea2f6d5b.exe

    • Size

      45KB

    • MD5

      00498decc7d48bbadca86283494b2396

    • SHA1

      247e02f5ff2ef72d2ebe9232c449a3ed1a500250

    • SHA256

      7f3e474588bb41a571bfa13916fdf76d6fba54da4e7d2f010490067bea2f6d5b

    • SHA512

      931c18658a735b237849dc2a9cf6d3bcf44a7376a8b5175e18d1b2bd5e58ee4dd3c2de9bbebb58751099fbb50853db7f7f91a9ea8351a301ff5fc8f244cd6f32

    • SSDEEP

      768:JhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2N:TsWE9N5dFu53dsniQaB/xZ14n7zIF+qx

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks