General

  • Target

    04db571bb759920bfc5e43b754a549927c43eb5aca75cc38566dfdd95916de86N.exe

  • Size

    110KB

  • Sample

    250117-aeq4lavqfx

  • MD5

    e00e9a405968800c1b69b935f78af680

  • SHA1

    5faeee6c59223777732ef04c22c6894cbd1255c0

  • SHA256

    04db571bb759920bfc5e43b754a549927c43eb5aca75cc38566dfdd95916de86

  • SHA512

    54499499ce7d7d47f74bb7fbdf4b8e545be59d7f1cd4d32dc718f1d39e16fd9a177f6e14575a0373ac9b1d14a24421fba7bd415a1c1b2c6f0decd75d90c0b341

  • SSDEEP

    1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:HiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      04db571bb759920bfc5e43b754a549927c43eb5aca75cc38566dfdd95916de86N.exe

    • Size

      110KB

    • MD5

      e00e9a405968800c1b69b935f78af680

    • SHA1

      5faeee6c59223777732ef04c22c6894cbd1255c0

    • SHA256

      04db571bb759920bfc5e43b754a549927c43eb5aca75cc38566dfdd95916de86

    • SHA512

      54499499ce7d7d47f74bb7fbdf4b8e545be59d7f1cd4d32dc718f1d39e16fd9a177f6e14575a0373ac9b1d14a24421fba7bd415a1c1b2c6f0decd75d90c0b341

    • SSDEEP

      1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:HiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks