General

  • Target

    5a286d50400f87b087da17dcd123ad1115819e7ee8fc116fe0d7326d256f849a.exe

  • Size

    45KB

  • Sample

    241120-a8z9csxdmj

  • MD5

    5f12a668ffc0efe34046ebfb66d72689

  • SHA1

    0f74fe9bd6682860bd6d79deb476bb52c03fde71

  • SHA256

    5a286d50400f87b087da17dcd123ad1115819e7ee8fc116fe0d7326d256f849a

  • SHA512

    fa33bce7d561a81b9cb9175b7d9eb49a062a77737ece403d136b96d9624b358f534254d645aa06fa95d9cff55d262d1f6e475e91e111d257c6978ffb3646a53f

  • SSDEEP

    768:0hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2l:4sWE9N5dFu53dsniQaB/xZ14n7zIF+qp

Malware Config

Targets

    • Target

      5a286d50400f87b087da17dcd123ad1115819e7ee8fc116fe0d7326d256f849a.exe

    • Size

      45KB

    • MD5

      5f12a668ffc0efe34046ebfb66d72689

    • SHA1

      0f74fe9bd6682860bd6d79deb476bb52c03fde71

    • SHA256

      5a286d50400f87b087da17dcd123ad1115819e7ee8fc116fe0d7326d256f849a

    • SHA512

      fa33bce7d561a81b9cb9175b7d9eb49a062a77737ece403d136b96d9624b358f534254d645aa06fa95d9cff55d262d1f6e475e91e111d257c6978ffb3646a53f

    • SSDEEP

      768:0hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2l:4sWE9N5dFu53dsniQaB/xZ14n7zIF+qp

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks