General

  • Target

    a340e5e8b0261b178fe6913a1ae3447642e9664fd3b1b04a818e81c86bad7f11N.exe

  • Size

    45KB

  • Sample

    241122-1y8qvszqdz

  • MD5

    8fcedbb47a3fde51a940b88ce63c58b0

  • SHA1

    63b0aeb2dbc86a2d9ac2e7f30edbd3a2c3fc5678

  • SHA256

    a340e5e8b0261b178fe6913a1ae3447642e9664fd3b1b04a818e81c86bad7f11

  • SHA512

    a1a95e9da1bd016afcb6b981dd9dde28ba80238eafc4d6c19c07e1505e920321756e57c9b845de91070009c715b46ab793ded0993ce71df6fb1af74b6105a914

  • SSDEEP

    768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      a340e5e8b0261b178fe6913a1ae3447642e9664fd3b1b04a818e81c86bad7f11N.exe

    • Size

      45KB

    • MD5

      8fcedbb47a3fde51a940b88ce63c58b0

    • SHA1

      63b0aeb2dbc86a2d9ac2e7f30edbd3a2c3fc5678

    • SHA256

      a340e5e8b0261b178fe6913a1ae3447642e9664fd3b1b04a818e81c86bad7f11

    • SHA512

      a1a95e9da1bd016afcb6b981dd9dde28ba80238eafc4d6c19c07e1505e920321756e57c9b845de91070009c715b46ab793ded0993ce71df6fb1af74b6105a914

    • SSDEEP

      768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks