General

  • Target

    e468608e17d35e1033dda6e385e46d47659024a4c2323f194cc96115ef51ec22.exe

  • Size

    160KB

  • Sample

    241122-klj9qsxnhs

  • MD5

    89c8b49c55e3ddb2a6b108f201755b50

  • SHA1

    6711ed56ac5aa84d7e2509c4c6353441a460c515

  • SHA256

    e468608e17d35e1033dda6e385e46d47659024a4c2323f194cc96115ef51ec22

  • SHA512

    c50475046fceeca08fe10b4d69d0f6a409ea21a38822afdbac70d02c8dd2fae659b63fd91a8c93d0b47dc19d86de6bfe6686257a131b759cf23612a83b1fb08c

  • SSDEEP

    1536:iEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:pY+4MiIkLZJNAQ9J6vO

Malware Config

Targets

    • Target

      e468608e17d35e1033dda6e385e46d47659024a4c2323f194cc96115ef51ec22.exe

    • Size

      160KB

    • MD5

      89c8b49c55e3ddb2a6b108f201755b50

    • SHA1

      6711ed56ac5aa84d7e2509c4c6353441a460c515

    • SHA256

      e468608e17d35e1033dda6e385e46d47659024a4c2323f194cc96115ef51ec22

    • SHA512

      c50475046fceeca08fe10b4d69d0f6a409ea21a38822afdbac70d02c8dd2fae659b63fd91a8c93d0b47dc19d86de6bfe6686257a131b759cf23612a83b1fb08c

    • SSDEEP

      1536:iEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:pY+4MiIkLZJNAQ9J6vO

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks