General

  • Target

    1e021a560a0c782597509078d4ccd3ca61b3e84010119657d53be31f1a8e6038.exe

  • Size

    160KB

  • Sample

    241124-hkcgdsymay

  • MD5

    885fbfec80dc513a3ee2762fdbe66538

  • SHA1

    c0994412ac5c5366eeef86a3266fc5bd8c8f2221

  • SHA256

    1e021a560a0c782597509078d4ccd3ca61b3e84010119657d53be31f1a8e6038

  • SHA512

    b353979ed896e052dfd7f6c3f3c828ec8567e60c62c88ddb51167838441f5929bd1a68f4d87eb340ed39d8833bce34136d02c9d8ee41abfa8f996797081c8258

  • SSDEEP

    1536:iEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:pY+4MiIkLZJNAQ9J6ve

Malware Config

Targets

    • Target

      1e021a560a0c782597509078d4ccd3ca61b3e84010119657d53be31f1a8e6038.exe

    • Size

      160KB

    • MD5

      885fbfec80dc513a3ee2762fdbe66538

    • SHA1

      c0994412ac5c5366eeef86a3266fc5bd8c8f2221

    • SHA256

      1e021a560a0c782597509078d4ccd3ca61b3e84010119657d53be31f1a8e6038

    • SHA512

      b353979ed896e052dfd7f6c3f3c828ec8567e60c62c88ddb51167838441f5929bd1a68f4d87eb340ed39d8833bce34136d02c9d8ee41abfa8f996797081c8258

    • SSDEEP

      1536:iEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:pY+4MiIkLZJNAQ9J6ve

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks