General

  • Target

    52de61824deb74e4cda27f246f88818ad83ffd912c45819d38a8a4de9cb4d5af.exe

  • Size

    160KB

  • Sample

    241124-af667stnfx

  • MD5

    cedeb9a9d9176194bcbdec2148684d63

  • SHA1

    3bebc8bf2675f6dac6f972b76c80e6e2976fcb15

  • SHA256

    52de61824deb74e4cda27f246f88818ad83ffd912c45819d38a8a4de9cb4d5af

  • SHA512

    2b9b2b4c538242bd1cb91be7e0e0c85db75bbcbc1f117ce92fa20dd69121d403fcefff7518779b4c0e22927eb3a520ed11a47bb65a3ccb2e930fdf54705cd40e

  • SSDEEP

    1536:fEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:MY+4MiIkLZJNAQ9J6vq

Malware Config

Targets

    • Target

      52de61824deb74e4cda27f246f88818ad83ffd912c45819d38a8a4de9cb4d5af.exe

    • Size

      160KB

    • MD5

      cedeb9a9d9176194bcbdec2148684d63

    • SHA1

      3bebc8bf2675f6dac6f972b76c80e6e2976fcb15

    • SHA256

      52de61824deb74e4cda27f246f88818ad83ffd912c45819d38a8a4de9cb4d5af

    • SHA512

      2b9b2b4c538242bd1cb91be7e0e0c85db75bbcbc1f117ce92fa20dd69121d403fcefff7518779b4c0e22927eb3a520ed11a47bb65a3ccb2e930fdf54705cd40e

    • SSDEEP

      1536:fEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph0:MY+4MiIkLZJNAQ9J6vq

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks