General

  • Target

    3bc4a2e78fd858a4be1849bd080a596d15ae2768423044f6112c12e9ea3da99e.exe

  • Size

    160KB

  • Sample

    241123-t6x6rsxqhs

  • MD5

    ff9b9dec68136843b09bab8dfa81ecda

  • SHA1

    3ae1761a09bd856a499cf35ca735251e8e8c09d8

  • SHA256

    3bc4a2e78fd858a4be1849bd080a596d15ae2768423044f6112c12e9ea3da99e

  • SHA512

    3f04c3bf7e0d953fc2595b225f8021e8bb15a8bbf9575ecb7687d2435035b3c54c66a461378ecfe9c0d37894842a53a37ef6a102353b7515cf0ac2b87ad34119

  • SSDEEP

    1536:5EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:yY+4MiIkLZJNAQ9J6vu

Malware Config

Targets

    • Target

      3bc4a2e78fd858a4be1849bd080a596d15ae2768423044f6112c12e9ea3da99e.exe

    • Size

      160KB

    • MD5

      ff9b9dec68136843b09bab8dfa81ecda

    • SHA1

      3ae1761a09bd856a499cf35ca735251e8e8c09d8

    • SHA256

      3bc4a2e78fd858a4be1849bd080a596d15ae2768423044f6112c12e9ea3da99e

    • SHA512

      3f04c3bf7e0d953fc2595b225f8021e8bb15a8bbf9575ecb7687d2435035b3c54c66a461378ecfe9c0d37894842a53a37ef6a102353b7515cf0ac2b87ad34119

    • SSDEEP

      1536:5EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:yY+4MiIkLZJNAQ9J6vu

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks