General

  • Target

    a3543a25e839c4b2ef7fa68f923c174aa73f79cbdcafc701bfd9577ed20fbc9e.exe

  • Size

    45KB

  • Sample

    241115-3s86jsyndl

  • MD5

    88a45f1c930af04c295f7a89f8983fe5

  • SHA1

    e25fc8b1d8a1880d3f194df90646c9032f2d76ab

  • SHA256

    a3543a25e839c4b2ef7fa68f923c174aa73f79cbdcafc701bfd9577ed20fbc9e

  • SHA512

    e1e6e83ecc04a2963107b5679f0cdc03a0f808da15b3320e09e63b8088c71dcec16636b22e6af58215e0addf376f2001cd77ff29386fae05d73b82f5c84a9915

  • SSDEEP

    768:NhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:vsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

Malware Config

Targets

    • Target

      a3543a25e839c4b2ef7fa68f923c174aa73f79cbdcafc701bfd9577ed20fbc9e.exe

    • Size

      45KB

    • MD5

      88a45f1c930af04c295f7a89f8983fe5

    • SHA1

      e25fc8b1d8a1880d3f194df90646c9032f2d76ab

    • SHA256

      a3543a25e839c4b2ef7fa68f923c174aa73f79cbdcafc701bfd9577ed20fbc9e

    • SHA512

      e1e6e83ecc04a2963107b5679f0cdc03a0f808da15b3320e09e63b8088c71dcec16636b22e6af58215e0addf376f2001cd77ff29386fae05d73b82f5c84a9915

    • SSDEEP

      768:NhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:vsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks