General

  • Target

    095ce18345b1dcc19202042cfc8a2fa102de4bd62930e1c56c8af7ee2dbb685c.exe

  • Size

    36KB

  • Sample

    241122-s66bpszlbk

  • MD5

    5a5cbf73bbd942d6cb1fa631ce0c9995

  • SHA1

    70fd9099efd1255eac4e2c57b9d674d46afd8b73

  • SHA256

    095ce18345b1dcc19202042cfc8a2fa102de4bd62930e1c56c8af7ee2dbb685c

  • SHA512

    01e317ed9d10e53652f2acd3792754261fa32ef500239373142f5ae086bde966247400756889c46670336769b485290002dd2b256ef7342dc00680865cd7100c

  • SSDEEP

    768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:npYoX58z1uirL98xMWnT0OQ9JW

Malware Config

Targets

    • Target

      095ce18345b1dcc19202042cfc8a2fa102de4bd62930e1c56c8af7ee2dbb685c.exe

    • Size

      36KB

    • MD5

      5a5cbf73bbd942d6cb1fa631ce0c9995

    • SHA1

      70fd9099efd1255eac4e2c57b9d674d46afd8b73

    • SHA256

      095ce18345b1dcc19202042cfc8a2fa102de4bd62930e1c56c8af7ee2dbb685c

    • SHA512

      01e317ed9d10e53652f2acd3792754261fa32ef500239373142f5ae086bde966247400756889c46670336769b485290002dd2b256ef7342dc00680865cd7100c

    • SSDEEP

      768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:npYoX58z1uirL98xMWnT0OQ9JW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks