General

  • Target

    a2c79f7508564ac00346d22e3206048a18f6caa9aa3a629255749eac81c27241N.exe

  • Size

    45KB

  • Sample

    250112-ew69cswma1

  • MD5

    e51acc7d6b0b6b7691ddf5658c366400

  • SHA1

    00b7d503c8d95b7084872bb3348e9a3a81e265ee

  • SHA256

    a2c79f7508564ac00346d22e3206048a18f6caa9aa3a629255749eac81c27241

  • SHA512

    1003b00de5a07c49d44e16d7d369bd8bcffe52ce161df228ac4696d59e0f1838781a2885b672320ba8b0bb29dfb7c03c91b3c799f841dc4fc7b4cc0c09c161f8

  • SSDEEP

    768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      a2c79f7508564ac00346d22e3206048a18f6caa9aa3a629255749eac81c27241N.exe

    • Size

      45KB

    • MD5

      e51acc7d6b0b6b7691ddf5658c366400

    • SHA1

      00b7d503c8d95b7084872bb3348e9a3a81e265ee

    • SHA256

      a2c79f7508564ac00346d22e3206048a18f6caa9aa3a629255749eac81c27241

    • SHA512

      1003b00de5a07c49d44e16d7d369bd8bcffe52ce161df228ac4696d59e0f1838781a2885b672320ba8b0bb29dfb7c03c91b3c799f841dc4fc7b4cc0c09c161f8

    • SSDEEP

      768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks