General

  • Target

    1e0ea2ba16546183a3b94942b0d2dbbc9500bfc034d6e221413372facf383533N.exe

  • Size

    89KB

  • Sample

    250124-kqsfxaznet

  • MD5

    e007bc0b543a615b26b795d4e38a9860

  • SHA1

    3b9b1dd3a2092244245f178ad289e2a4b12683d8

  • SHA256

    1e0ea2ba16546183a3b94942b0d2dbbc9500bfc034d6e221413372facf383533

  • SHA512

    6cb14d940a580a17844cdd86c9467da89109f2fbb5f1338b03c58ff1dc2601c704be6ef5c3bc0cd8816f114ed4338b848098d2280bf86b077a5d16543bf6e24d

  • SSDEEP

    1536:I1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:c+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      1e0ea2ba16546183a3b94942b0d2dbbc9500bfc034d6e221413372facf383533N.exe

    • Size

      89KB

    • MD5

      e007bc0b543a615b26b795d4e38a9860

    • SHA1

      3b9b1dd3a2092244245f178ad289e2a4b12683d8

    • SHA256

      1e0ea2ba16546183a3b94942b0d2dbbc9500bfc034d6e221413372facf383533

    • SHA512

      6cb14d940a580a17844cdd86c9467da89109f2fbb5f1338b03c58ff1dc2601c704be6ef5c3bc0cd8816f114ed4338b848098d2280bf86b077a5d16543bf6e24d

    • SSDEEP

      1536:I1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:c+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks