General

  • Target

    7c468b9acf6bfe94d4c188e2e6291372fb44656e2ed49eed9eb20ff725f27e43.exe

  • Size

    34KB

  • Sample

    241124-j81dssxpgm

  • MD5

    93f5b1527e924ced5cbe62bd1d1d04bb

  • SHA1

    7d876e5d1ed33874e98031e14e33aea843cb74ad

  • SHA256

    7c468b9acf6bfe94d4c188e2e6291372fb44656e2ed49eed9eb20ff725f27e43

  • SHA512

    a38a48d102a989e39d19f2e8ffac6458e007964d5bf3493989abdcbbbfa9c09fa66f2ba29cc38addd789774180a79a9a468f111d7fa40540722a47b75646176c

  • SSDEEP

    768:tp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:tpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      7c468b9acf6bfe94d4c188e2e6291372fb44656e2ed49eed9eb20ff725f27e43.exe

    • Size

      34KB

    • MD5

      93f5b1527e924ced5cbe62bd1d1d04bb

    • SHA1

      7d876e5d1ed33874e98031e14e33aea843cb74ad

    • SHA256

      7c468b9acf6bfe94d4c188e2e6291372fb44656e2ed49eed9eb20ff725f27e43

    • SHA512

      a38a48d102a989e39d19f2e8ffac6458e007964d5bf3493989abdcbbbfa9c09fa66f2ba29cc38addd789774180a79a9a468f111d7fa40540722a47b75646176c

    • SSDEEP

      768:tp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:tpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks