General

  • Target

    5ac0e0773ab3d160c3f1c08a9a42cf6b5b3d5ed88e0d276151495fe99de92baa.exe

  • Size

    160KB

  • Sample

    241123-kk9g8syjgn

  • MD5

    50127625f0c9d1c2cb009670c2df6fb2

  • SHA1

    6e1a0246b499b869497cefbfab57759bf5fdb9e2

  • SHA256

    5ac0e0773ab3d160c3f1c08a9a42cf6b5b3d5ed88e0d276151495fe99de92baa

  • SHA512

    45e92a37f6b93132b9d94f0876d71c187afca94092f3e81eccd46dd48424048da1f983ef275536c8f68c248bfdb1caa9c3b6eb34a99555b6dd09543a0d04b7c8

  • SSDEEP

    1536:2EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:dY+4MiIkLZJNAQ9J6vq

Malware Config

Targets

    • Target

      5ac0e0773ab3d160c3f1c08a9a42cf6b5b3d5ed88e0d276151495fe99de92baa.exe

    • Size

      160KB

    • MD5

      50127625f0c9d1c2cb009670c2df6fb2

    • SHA1

      6e1a0246b499b869497cefbfab57759bf5fdb9e2

    • SHA256

      5ac0e0773ab3d160c3f1c08a9a42cf6b5b3d5ed88e0d276151495fe99de92baa

    • SHA512

      45e92a37f6b93132b9d94f0876d71c187afca94092f3e81eccd46dd48424048da1f983ef275536c8f68c248bfdb1caa9c3b6eb34a99555b6dd09543a0d04b7c8

    • SSDEEP

      1536:2EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:dY+4MiIkLZJNAQ9J6vq

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks