General

  • Target

    e0904f6e511df12e81ea3dab2807054ddaf35afb1c0c9f1065d555630c2addadN.exe

  • Size

    49KB

  • Sample

    241113-v4gxfavrdz

  • MD5

    bb3d84cfcff7667bd414aa8589daa970

  • SHA1

    d878230c5b2a57dcd1a92440597e8a9b052a925d

  • SHA256

    e0904f6e511df12e81ea3dab2807054ddaf35afb1c0c9f1065d555630c2addad

  • SHA512

    c29e155f18aeae261b1e33008648cafc7987f9dd596a6aa6466a41388223cf762100197444149cfbef9e62c7c8aeb79c2751f6a4ed17ad621cc3fa9aa1885aff

  • SSDEEP

    1536:wOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:wYLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      e0904f6e511df12e81ea3dab2807054ddaf35afb1c0c9f1065d555630c2addadN.exe

    • Size

      49KB

    • MD5

      bb3d84cfcff7667bd414aa8589daa970

    • SHA1

      d878230c5b2a57dcd1a92440597e8a9b052a925d

    • SHA256

      e0904f6e511df12e81ea3dab2807054ddaf35afb1c0c9f1065d555630c2addad

    • SHA512

      c29e155f18aeae261b1e33008648cafc7987f9dd596a6aa6466a41388223cf762100197444149cfbef9e62c7c8aeb79c2751f6a4ed17ad621cc3fa9aa1885aff

    • SSDEEP

      1536:wOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:wYLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks