General

  • Target

    247115cc21949d558f5bd09c872c147b1e058f060ec09c24e36133dc1fa2b2a7.exe

  • Size

    34KB

  • Sample

    241122-x23r8sspfr

  • MD5

    3c502cad92ff3b39f15073ec4ace3be6

  • SHA1

    9131706c0a3e5f8864c5ec2fc44d42e0d4616c82

  • SHA256

    247115cc21949d558f5bd09c872c147b1e058f060ec09c24e36133dc1fa2b2a7

  • SHA512

    ff0efef1b6743618b217cb28972830d58c3743c62debd3b80b041b8469ec7adbeddc4e47d9a92ff6393ba0fd8483d3583159d73038acbd5c75841f129acae2fc

  • SSDEEP

    768:Op22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:OpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      247115cc21949d558f5bd09c872c147b1e058f060ec09c24e36133dc1fa2b2a7.exe

    • Size

      34KB

    • MD5

      3c502cad92ff3b39f15073ec4ace3be6

    • SHA1

      9131706c0a3e5f8864c5ec2fc44d42e0d4616c82

    • SHA256

      247115cc21949d558f5bd09c872c147b1e058f060ec09c24e36133dc1fa2b2a7

    • SHA512

      ff0efef1b6743618b217cb28972830d58c3743c62debd3b80b041b8469ec7adbeddc4e47d9a92ff6393ba0fd8483d3583159d73038acbd5c75841f129acae2fc

    • SSDEEP

      768:Op22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:OpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks