General

  • Target

    ebc5882aab4e56bdbed1e7720817bc47c26b75cc7fe2feb5279d1a2816fbdfb2.exe

  • Size

    34KB

  • Sample

    241203-l42r6szrcs

  • MD5

    a5cc98a04a64bdbc0a4e3ff5456bae18

  • SHA1

    7285148d9f33b211248b9a0e57422e3db7467691

  • SHA256

    ebc5882aab4e56bdbed1e7720817bc47c26b75cc7fe2feb5279d1a2816fbdfb2

  • SHA512

    c13726e1737456cf6bb251971f063d61b89ee7261f2bea7b51de2adcff17685eadec73ff98a9c4de0204c7b785b77ad858aabd4c0702d195a8f06c974336419e

  • SSDEEP

    768:Lp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:LpYoX58z1uirL98xMWnT0OQ9JW

Malware Config

Targets

    • Target

      ebc5882aab4e56bdbed1e7720817bc47c26b75cc7fe2feb5279d1a2816fbdfb2.exe

    • Size

      34KB

    • MD5

      a5cc98a04a64bdbc0a4e3ff5456bae18

    • SHA1

      7285148d9f33b211248b9a0e57422e3db7467691

    • SHA256

      ebc5882aab4e56bdbed1e7720817bc47c26b75cc7fe2feb5279d1a2816fbdfb2

    • SHA512

      c13726e1737456cf6bb251971f063d61b89ee7261f2bea7b51de2adcff17685eadec73ff98a9c4de0204c7b785b77ad858aabd4c0702d195a8f06c974336419e

    • SSDEEP

      768:Lp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:LpYoX58z1uirL98xMWnT0OQ9JW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks