General

  • Target

    72550eaa59091300e97b56fed8c23ae2c254bdefc1c599a62d6c32d25ef780ed.exe

  • Size

    89KB

  • Sample

    241123-q21jjsslbl

  • MD5

    0cf7434544927a4ac240dc24d1928078

  • SHA1

    2738ad18bee626be4e5c5c727934653c2ba7e67f

  • SHA256

    72550eaa59091300e97b56fed8c23ae2c254bdefc1c599a62d6c32d25ef780ed

  • SHA512

    db7a7747fc302bc07aa01c940bd17cbf381cd89f0f55da7d6d2a0ec0cfa2b425badfa5844e60702a3414c2148b6a25b16f67c2cc7648cc1a8145352289292c5e

  • SSDEEP

    1536:mr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:o+4MJIkLZJNAQ9Jo9u

Malware Config

Targets

    • Target

      72550eaa59091300e97b56fed8c23ae2c254bdefc1c599a62d6c32d25ef780ed.exe

    • Size

      89KB

    • MD5

      0cf7434544927a4ac240dc24d1928078

    • SHA1

      2738ad18bee626be4e5c5c727934653c2ba7e67f

    • SHA256

      72550eaa59091300e97b56fed8c23ae2c254bdefc1c599a62d6c32d25ef780ed

    • SHA512

      db7a7747fc302bc07aa01c940bd17cbf381cd89f0f55da7d6d2a0ec0cfa2b425badfa5844e60702a3414c2148b6a25b16f67c2cc7648cc1a8145352289292c5e

    • SSDEEP

      1536:mr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:o+4MJIkLZJNAQ9Jo9u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks