General

  • Target

    9aa7f5e73bedced4dad97fe3217df8df1f6edd0241a8ad53cb4351b79989713a.exe

  • Size

    110KB

  • Sample

    250122-s1amvasrat

  • MD5

    9b8ae9c0cc891fc4c67a9dc747ad2b28

  • SHA1

    aaa52dc80f3671d4832f28c60d369f9527e12f10

  • SHA256

    9aa7f5e73bedced4dad97fe3217df8df1f6edd0241a8ad53cb4351b79989713a

  • SHA512

    af91f6782025ec79688ca44d05ca05a06ecbf71cda1a89590dd576117f384b63312a206c7f5b674c0867c20a9e0bcd6a88764bd633a32638abe7745d92966494

  • SSDEEP

    1536:eiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:eiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      9aa7f5e73bedced4dad97fe3217df8df1f6edd0241a8ad53cb4351b79989713a.exe

    • Size

      110KB

    • MD5

      9b8ae9c0cc891fc4c67a9dc747ad2b28

    • SHA1

      aaa52dc80f3671d4832f28c60d369f9527e12f10

    • SHA256

      9aa7f5e73bedced4dad97fe3217df8df1f6edd0241a8ad53cb4351b79989713a

    • SHA512

      af91f6782025ec79688ca44d05ca05a06ecbf71cda1a89590dd576117f384b63312a206c7f5b674c0867c20a9e0bcd6a88764bd633a32638abe7745d92966494

    • SSDEEP

      1536:eiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:eiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks