General

  • Target

    753b8a6e756cec392dcd82b9d01f75a7b79bc64eaf0f75e132dd1adaa8dd5e24.exe

  • Size

    36KB

  • Sample

    241124-bcztdswkcw

  • MD5

    79060e72b113f0ce18ac82cba75bfd01

  • SHA1

    7a8132486862cf976919671260c1e5c0b3cca41c

  • SHA256

    753b8a6e756cec392dcd82b9d01f75a7b79bc64eaf0f75e132dd1adaa8dd5e24

  • SHA512

    7824a51bb6dfb32d47b58ce1843a5c55e21ef39e7fadca3f24b0ada8d5db22ca73d68d89e61e9624d67575971414a6e0f65ba6f7c56cbbd30ede335db870397b

  • SSDEEP

    768:fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jy:fpYoX58z1uirL98xMWnT0OQ9Jy

Malware Config

Targets

    • Target

      753b8a6e756cec392dcd82b9d01f75a7b79bc64eaf0f75e132dd1adaa8dd5e24.exe

    • Size

      36KB

    • MD5

      79060e72b113f0ce18ac82cba75bfd01

    • SHA1

      7a8132486862cf976919671260c1e5c0b3cca41c

    • SHA256

      753b8a6e756cec392dcd82b9d01f75a7b79bc64eaf0f75e132dd1adaa8dd5e24

    • SHA512

      7824a51bb6dfb32d47b58ce1843a5c55e21ef39e7fadca3f24b0ada8d5db22ca73d68d89e61e9624d67575971414a6e0f65ba6f7c56cbbd30ede335db870397b

    • SSDEEP

      768:fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jy:fpYoX58z1uirL98xMWnT0OQ9Jy

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks