General

  • Target

    7ebdb56aa171dc73f4d79e80ec9dbb9d69abde3f2eaebcc32e77a969f8d75b7d.exe

  • Size

    34KB

  • Sample

    241124-dczjqszraw

  • MD5

    d196696f808941349f8f497c8bd270c8

  • SHA1

    46f71b080886008d86626586fc476852e5e8c8f0

  • SHA256

    7ebdb56aa171dc73f4d79e80ec9dbb9d69abde3f2eaebcc32e77a969f8d75b7d

  • SHA512

    a9b4c20aa16bc934d83362b18d259207aa00de438004d62dd99d12d1d04d5738b17566fa578d95a43fab2a2716f2c634aab0c39ab874280f0a8e2d8920eeeffe

  • SSDEEP

    768:Bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jm:BpYoX58z1uirL98xMWnT0OQ9Jm

Malware Config

Targets

    • Target

      7ebdb56aa171dc73f4d79e80ec9dbb9d69abde3f2eaebcc32e77a969f8d75b7d.exe

    • Size

      34KB

    • MD5

      d196696f808941349f8f497c8bd270c8

    • SHA1

      46f71b080886008d86626586fc476852e5e8c8f0

    • SHA256

      7ebdb56aa171dc73f4d79e80ec9dbb9d69abde3f2eaebcc32e77a969f8d75b7d

    • SHA512

      a9b4c20aa16bc934d83362b18d259207aa00de438004d62dd99d12d1d04d5738b17566fa578d95a43fab2a2716f2c634aab0c39ab874280f0a8e2d8920eeeffe

    • SSDEEP

      768:Bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jm:BpYoX58z1uirL98xMWnT0OQ9Jm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks