General

  • Target

    8c97d6b57a4ea1c57c40b955225a453f9e696cbf5696e8f7bd2044705fd3a5faN.exe

  • Size

    45KB

  • Sample

    241124-vkjxpawkfl

  • MD5

    35662196929d22cdc512d43e606302c0

  • SHA1

    10d16ae2901ddc5454c55efeec1d1737308c50e6

  • SHA256

    8c97d6b57a4ea1c57c40b955225a453f9e696cbf5696e8f7bd2044705fd3a5fa

  • SHA512

    322c301131c9175b6e9b83efc544b00e391f052c1f5e98130d9936e88ff09bd352a4920bafd26f8e46365888482acd0bf6c11987933758a07de442a5baac6b6e

  • SSDEEP

    768:5hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:jsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      8c97d6b57a4ea1c57c40b955225a453f9e696cbf5696e8f7bd2044705fd3a5faN.exe

    • Size

      45KB

    • MD5

      35662196929d22cdc512d43e606302c0

    • SHA1

      10d16ae2901ddc5454c55efeec1d1737308c50e6

    • SHA256

      8c97d6b57a4ea1c57c40b955225a453f9e696cbf5696e8f7bd2044705fd3a5fa

    • SHA512

      322c301131c9175b6e9b83efc544b00e391f052c1f5e98130d9936e88ff09bd352a4920bafd26f8e46365888482acd0bf6c11987933758a07de442a5baac6b6e

    • SSDEEP

      768:5hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:jsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks