General

  • Target

    bbecdaf4eedadfd40cbcbe3032c9b0e55eb7f1a94dd84a3a0f3f14c37f53eb39.exe

  • Size

    89KB

  • Sample

    241123-a81j5atmbv

  • MD5

    ed1965d31f5c1d1496d7efa158a6351c

  • SHA1

    72785ff1fd25124ac29a4cba486ae41418f276fe

  • SHA256

    bbecdaf4eedadfd40cbcbe3032c9b0e55eb7f1a94dd84a3a0f3f14c37f53eb39

  • SHA512

    f319eb1077e254c688e521eda311bab5f0727b83648ca28d13c95e6c9f9f0faaea61e89edd8f52913a3de8b0087b2125858698bf75ea3132a148069c28e9cd51

  • SSDEEP

    1536:2r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:4+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      bbecdaf4eedadfd40cbcbe3032c9b0e55eb7f1a94dd84a3a0f3f14c37f53eb39.exe

    • Size

      89KB

    • MD5

      ed1965d31f5c1d1496d7efa158a6351c

    • SHA1

      72785ff1fd25124ac29a4cba486ae41418f276fe

    • SHA256

      bbecdaf4eedadfd40cbcbe3032c9b0e55eb7f1a94dd84a3a0f3f14c37f53eb39

    • SHA512

      f319eb1077e254c688e521eda311bab5f0727b83648ca28d13c95e6c9f9f0faaea61e89edd8f52913a3de8b0087b2125858698bf75ea3132a148069c28e9cd51

    • SSDEEP

      1536:2r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:4+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks