General

  • Target

    d29a2d5721500e7fb1d75bd1fee91ec4b6bf595a06c7944ac3bfcbb45d030589.exe

  • Size

    49KB

  • Sample

    241113-pxg1zasdrk

  • MD5

    ae78f665de8ef596f9bdad14274f8f8b

  • SHA1

    16a8c273484c617f6fff6d6e69800c34954fce22

  • SHA256

    d29a2d5721500e7fb1d75bd1fee91ec4b6bf595a06c7944ac3bfcbb45d030589

  • SHA512

    44555c19684fdcd88c3425993b5ae4e0d3517ef0b2567824eb1639d72ff4f3d793c40a39a637b252b631f407f24c58e65d80bb61dd7a1061f3f399e7f6d05aad

  • SSDEEP

    1536:wOBLXNqgzf2v6b6NkXklZlogHGe9eBXWP:wYLduv6OqXIlogmjWP

Malware Config

Targets

    • Target

      d29a2d5721500e7fb1d75bd1fee91ec4b6bf595a06c7944ac3bfcbb45d030589.exe

    • Size

      49KB

    • MD5

      ae78f665de8ef596f9bdad14274f8f8b

    • SHA1

      16a8c273484c617f6fff6d6e69800c34954fce22

    • SHA256

      d29a2d5721500e7fb1d75bd1fee91ec4b6bf595a06c7944ac3bfcbb45d030589

    • SHA512

      44555c19684fdcd88c3425993b5ae4e0d3517ef0b2567824eb1639d72ff4f3d793c40a39a637b252b631f407f24c58e65d80bb61dd7a1061f3f399e7f6d05aad

    • SSDEEP

      1536:wOBLXNqgzf2v6b6NkXklZlogHGe9eBXWP:wYLduv6OqXIlogmjWP

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks