General

  • Target

    c21aa6f826e228139c32818c4179daa2b1830ff0637d3296bf0c54d388523917.exe

  • Size

    89KB

  • Sample

    241121-l4chaa1lh1

  • MD5

    9924d3e3dac2bf0b46d5a19a72d30788

  • SHA1

    a9fdd85c4a571b94855277a92222e6c8f9522a3f

  • SHA256

    c21aa6f826e228139c32818c4179daa2b1830ff0637d3296bf0c54d388523917

  • SHA512

    1fe18802ba506092ce68f5160e53f24d06a08f57c1c4f974fdbee5df5a8086a19a67f63eeaf58513997cf6bf59a5bb37f3a3a86e4dd1389c7ff510655516d0d8

  • SSDEEP

    1536:Dr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7K:X+4MJIkLZJNAQ9Jo9K

Malware Config

Targets

    • Target

      c21aa6f826e228139c32818c4179daa2b1830ff0637d3296bf0c54d388523917.exe

    • Size

      89KB

    • MD5

      9924d3e3dac2bf0b46d5a19a72d30788

    • SHA1

      a9fdd85c4a571b94855277a92222e6c8f9522a3f

    • SHA256

      c21aa6f826e228139c32818c4179daa2b1830ff0637d3296bf0c54d388523917

    • SHA512

      1fe18802ba506092ce68f5160e53f24d06a08f57c1c4f974fdbee5df5a8086a19a67f63eeaf58513997cf6bf59a5bb37f3a3a86e4dd1389c7ff510655516d0d8

    • SSDEEP

      1536:Dr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7K:X+4MJIkLZJNAQ9Jo9K

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks