General

  • Target

    5ab8992d28276169e390eadb30e78d5eaa3accf422482782d7ea26b5c9be0358N.exe

  • Size

    89KB

  • Sample

    241124-2bdgwasqhv

  • MD5

    406c653fd0cecf00f266fe40d011e430

  • SHA1

    4b5e2697c95c9f4089ac6a791569dbd9cd64dfb6

  • SHA256

    5ab8992d28276169e390eadb30e78d5eaa3accf422482782d7ea26b5c9be0358

  • SHA512

    823e3a264e65bb7309139989f958616410e865d69bdf745a55c1b561aac3e010f679d2db6db7f9fa01265d7514dad2e6cb834026991db8083b29ea6cfd837b3a

  • SSDEEP

    1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      5ab8992d28276169e390eadb30e78d5eaa3accf422482782d7ea26b5c9be0358N.exe

    • Size

      89KB

    • MD5

      406c653fd0cecf00f266fe40d011e430

    • SHA1

      4b5e2697c95c9f4089ac6a791569dbd9cd64dfb6

    • SHA256

      5ab8992d28276169e390eadb30e78d5eaa3accf422482782d7ea26b5c9be0358

    • SHA512

      823e3a264e65bb7309139989f958616410e865d69bdf745a55c1b561aac3e010f679d2db6db7f9fa01265d7514dad2e6cb834026991db8083b29ea6cfd837b3a

    • SSDEEP

      1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks