General

  • Target

    15ef78e8f056837326879680bdf4767a4f021e2afef9717253f403190e500dfc.exe

  • Size

    34KB

  • Sample

    250121-eaqz9avmbv

  • MD5

    042368d4c55f2e552874cf7813159d07

  • SHA1

    e73aa3055b2ee4504ff4af064313e0b77cdc341e

  • SHA256

    15ef78e8f056837326879680bdf4767a4f021e2afef9717253f403190e500dfc

  • SHA512

    4a19ba4972f745f1ac3fdbcff98d25ebd5aff662ed887ebe445055c617bab95fefaf250a1c07a2128888bb0d38a788acacf0dcb14eb81cbaa8396b9293db232f

  • SSDEEP

    768:qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jm:qpYoX58z1uirL98xMWnT0OQ9Jm

Malware Config

Targets

    • Target

      15ef78e8f056837326879680bdf4767a4f021e2afef9717253f403190e500dfc.exe

    • Size

      34KB

    • MD5

      042368d4c55f2e552874cf7813159d07

    • SHA1

      e73aa3055b2ee4504ff4af064313e0b77cdc341e

    • SHA256

      15ef78e8f056837326879680bdf4767a4f021e2afef9717253f403190e500dfc

    • SHA512

      4a19ba4972f745f1ac3fdbcff98d25ebd5aff662ed887ebe445055c617bab95fefaf250a1c07a2128888bb0d38a788acacf0dcb14eb81cbaa8396b9293db232f

    • SSDEEP

      768:qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jm:qpYoX58z1uirL98xMWnT0OQ9Jm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks