General

  • Target

    7ba7d79b25f66ceb02dd396cc43c33c19c94a84572ac84ae244946f755125703.exe

  • Size

    110KB

  • Sample

    250113-bcm5lazrcl

  • MD5

    2591732dfb2c9b87c2830c562e8b109f

  • SHA1

    7b3b5d59b453d30315c70ebd58405713d442b2b6

  • SHA256

    7ba7d79b25f66ceb02dd396cc43c33c19c94a84572ac84ae244946f755125703

  • SHA512

    73b40f2feb4eb08111b6ef527330b2aa0e6dc4820c362458abaad8ae136446c327361f9426692268a16b4d863059f1da93f66a72bc243f48d1bcb4275a4323a8

  • SSDEEP

    1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:GiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      7ba7d79b25f66ceb02dd396cc43c33c19c94a84572ac84ae244946f755125703.exe

    • Size

      110KB

    • MD5

      2591732dfb2c9b87c2830c562e8b109f

    • SHA1

      7b3b5d59b453d30315c70ebd58405713d442b2b6

    • SHA256

      7ba7d79b25f66ceb02dd396cc43c33c19c94a84572ac84ae244946f755125703

    • SHA512

      73b40f2feb4eb08111b6ef527330b2aa0e6dc4820c362458abaad8ae136446c327361f9426692268a16b4d863059f1da93f66a72bc243f48d1bcb4275a4323a8

    • SSDEEP

      1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:GiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks