General

  • Target

    cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe

  • Size

    110KB

  • Sample

    241116-vpxdkstqdl

  • MD5

    9553004dea6cc4ca6ec9dc94c85b6200

  • SHA1

    62c631c4782863ed0746a72de08db890a9667696

  • SHA256

    cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89

  • SHA512

    97b368296e4fbe6257e14566389f865938987ab0aa27db1eb1540808e21c5918e8c695acb72387bf8db60b08461bc34a0e2dff00df759521e942b30a72d3f717

  • SSDEEP

    1536:ZiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:ZiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89N.exe

    • Size

      110KB

    • MD5

      9553004dea6cc4ca6ec9dc94c85b6200

    • SHA1

      62c631c4782863ed0746a72de08db890a9667696

    • SHA256

      cff378b9e74d6be946cdbd7aeca4528bc8775521e3cad6575bd02f886d1beb89

    • SHA512

      97b368296e4fbe6257e14566389f865938987ab0aa27db1eb1540808e21c5918e8c695acb72387bf8db60b08461bc34a0e2dff00df759521e942b30a72d3f717

    • SSDEEP

      1536:ZiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:ZiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks