General

  • Target

    6a47dec02ded67e43ac7ca1be4314a42d7c890a2baffddfc4c7b0a303ea5efd4N.exe

  • Size

    45KB

  • Sample

    241119-vdv2dayhkj

  • MD5

    7c0b21e5d956ad8b9d4e31c6c9afad40

  • SHA1

    d3a365d7143dfc1578d26aaac1c94b17e2a41011

  • SHA256

    6a47dec02ded67e43ac7ca1be4314a42d7c890a2baffddfc4c7b0a303ea5efd4

  • SHA512

    1858d46bd7eaaa4d876ceb8a7ca52cebf906091590ac50d809600ebfbd15c7266b246eeacb0c2b5241fdd9e1c70ce3d2836bb453cb327e2f97636ecb05af5a37

  • SSDEEP

    768:ZhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:DsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      6a47dec02ded67e43ac7ca1be4314a42d7c890a2baffddfc4c7b0a303ea5efd4N.exe

    • Size

      45KB

    • MD5

      7c0b21e5d956ad8b9d4e31c6c9afad40

    • SHA1

      d3a365d7143dfc1578d26aaac1c94b17e2a41011

    • SHA256

      6a47dec02ded67e43ac7ca1be4314a42d7c890a2baffddfc4c7b0a303ea5efd4

    • SHA512

      1858d46bd7eaaa4d876ceb8a7ca52cebf906091590ac50d809600ebfbd15c7266b246eeacb0c2b5241fdd9e1c70ce3d2836bb453cb327e2f97636ecb05af5a37

    • SSDEEP

      768:ZhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:DsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks