General

  • Target

    939d20a3a11b654015dae2179a0e91104b2dd5be3caefd99840eca9cec5dd4f9.exe

  • Size

    34KB

  • Sample

    241123-fb6b1aylhs

  • MD5

    9f62652c1fb61ca6a43a210deb969749

  • SHA1

    af8428e45e7985f9b8f7c77718de14bc93601e0f

  • SHA256

    939d20a3a11b654015dae2179a0e91104b2dd5be3caefd99840eca9cec5dd4f9

  • SHA512

    4ec805e3ee4a911831332fe896e0edb45b34e35bc351e8ee96bd16fd1c716bd0c4cdc8d87b2aab494e41af1c13e6879e674f0add1081ae903981f721686d5957

  • SSDEEP

    768:4p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:4pYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      939d20a3a11b654015dae2179a0e91104b2dd5be3caefd99840eca9cec5dd4f9.exe

    • Size

      34KB

    • MD5

      9f62652c1fb61ca6a43a210deb969749

    • SHA1

      af8428e45e7985f9b8f7c77718de14bc93601e0f

    • SHA256

      939d20a3a11b654015dae2179a0e91104b2dd5be3caefd99840eca9cec5dd4f9

    • SHA512

      4ec805e3ee4a911831332fe896e0edb45b34e35bc351e8ee96bd16fd1c716bd0c4cdc8d87b2aab494e41af1c13e6879e674f0add1081ae903981f721686d5957

    • SSDEEP

      768:4p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:4pYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks