General

  • Target

    aed33262a96a42f95cdf8e730734c3e984b0b789855e05d40cd23d00bcbead1fN.exe

  • Size

    45KB

  • Sample

    241216-mae7rawlet

  • MD5

    87f85dda4e20c798b274d935cba399f0

  • SHA1

    f94f3c2df480f08d26dcce80ac61a72cc858ae41

  • SHA256

    aed33262a96a42f95cdf8e730734c3e984b0b789855e05d40cd23d00bcbead1f

  • SHA512

    2b473bf9c49b02085aea168f1f54a1e6aefc47f57a03fa6f2beb2c170836dbcdda75c7871372a0f42a6658b503dcab8523a316c3611f07837c85cba391166d16

  • SSDEEP

    768:ahP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:WsWE9N5dFu53dsniQaB/xZ14n7zIF+qL

Malware Config

Targets

    • Target

      aed33262a96a42f95cdf8e730734c3e984b0b789855e05d40cd23d00bcbead1fN.exe

    • Size

      45KB

    • MD5

      87f85dda4e20c798b274d935cba399f0

    • SHA1

      f94f3c2df480f08d26dcce80ac61a72cc858ae41

    • SHA256

      aed33262a96a42f95cdf8e730734c3e984b0b789855e05d40cd23d00bcbead1f

    • SHA512

      2b473bf9c49b02085aea168f1f54a1e6aefc47f57a03fa6f2beb2c170836dbcdda75c7871372a0f42a6658b503dcab8523a316c3611f07837c85cba391166d16

    • SSDEEP

      768:ahP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:WsWE9N5dFu53dsniQaB/xZ14n7zIF+qL

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks