General

  • Target

    0868b493231c1fb2594b68fd716f9afc708fc1be307977753ae80ad7a29a18f5.exe

  • Size

    45KB

  • Sample

    241122-r99b4asqas

  • MD5

    39f2f49ffc113bc8c60bb72c59a5c0ad

  • SHA1

    9981e59720a4e0ad1da6472718c8c008a06e2056

  • SHA256

    0868b493231c1fb2594b68fd716f9afc708fc1be307977753ae80ad7a29a18f5

  • SHA512

    94d81023087d1de6101a4b0a5f70ceea47ff1f58b8a814583d847d3feb1ae0ffd7ea35b2dd370b5fac17d7aa551a752009521d502ce0bf03e797e84f0daae123

  • SSDEEP

    768:VhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ21:HsWE9N5dFu53dsniQaB/xZ14n7zIF+qZ

Malware Config

Targets

    • Target

      0868b493231c1fb2594b68fd716f9afc708fc1be307977753ae80ad7a29a18f5.exe

    • Size

      45KB

    • MD5

      39f2f49ffc113bc8c60bb72c59a5c0ad

    • SHA1

      9981e59720a4e0ad1da6472718c8c008a06e2056

    • SHA256

      0868b493231c1fb2594b68fd716f9afc708fc1be307977753ae80ad7a29a18f5

    • SHA512

      94d81023087d1de6101a4b0a5f70ceea47ff1f58b8a814583d847d3feb1ae0ffd7ea35b2dd370b5fac17d7aa551a752009521d502ce0bf03e797e84f0daae123

    • SSDEEP

      768:VhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ21:HsWE9N5dFu53dsniQaB/xZ14n7zIF+qZ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks