General

  • Target

    ee7d16b480f75d425f4253631945b0cc4187275f8a12a8486edd4a6ce37a0c4d.exe

  • Size

    110KB

  • Sample

    241203-l6bzjawmaj

  • MD5

    0bdbf4c55e6c47e2b1c8ea2eda3da42f

  • SHA1

    04ec89b915583941fe8a811f7ce2bb96d764a5a7

  • SHA256

    ee7d16b480f75d425f4253631945b0cc4187275f8a12a8486edd4a6ce37a0c4d

  • SHA512

    79ba16c88823ecddc8debc5ccebf875da9eac9d6ffd4ed27af52896c79eb86fb3c379bd49f62a50637bd22d891e1ba057218ce109f904399dda3f07a147a2c7a

  • SSDEEP

    1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:UiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      ee7d16b480f75d425f4253631945b0cc4187275f8a12a8486edd4a6ce37a0c4d.exe

    • Size

      110KB

    • MD5

      0bdbf4c55e6c47e2b1c8ea2eda3da42f

    • SHA1

      04ec89b915583941fe8a811f7ce2bb96d764a5a7

    • SHA256

      ee7d16b480f75d425f4253631945b0cc4187275f8a12a8486edd4a6ce37a0c4d

    • SHA512

      79ba16c88823ecddc8debc5ccebf875da9eac9d6ffd4ed27af52896c79eb86fb3c379bd49f62a50637bd22d891e1ba057218ce109f904399dda3f07a147a2c7a

    • SSDEEP

      1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:UiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks