General

  • Target

    293e221185cd294c9d416ca4153c58053c3e829c9e65422dde7305ad8013a0c3N.exe

  • Size

    89KB

  • Sample

    241125-t1lwjsskfj

  • MD5

    d375561ffa3f3a897267b9a143cd0c30

  • SHA1

    92050749f5f8dff408e898977a9b6e384791221a

  • SHA256

    293e221185cd294c9d416ca4153c58053c3e829c9e65422dde7305ad8013a0c3

  • SHA512

    14e5f7e0e0a322e4dd14692c74ccde02c52a56823768d89cf2a96edad55cf2d03b54b5384e2ec5b4716369c3ea0ca139a273f96168e717c48fbb1039c11d10f6

  • SSDEEP

    1536:21+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:G+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      293e221185cd294c9d416ca4153c58053c3e829c9e65422dde7305ad8013a0c3N.exe

    • Size

      89KB

    • MD5

      d375561ffa3f3a897267b9a143cd0c30

    • SHA1

      92050749f5f8dff408e898977a9b6e384791221a

    • SHA256

      293e221185cd294c9d416ca4153c58053c3e829c9e65422dde7305ad8013a0c3

    • SHA512

      14e5f7e0e0a322e4dd14692c74ccde02c52a56823768d89cf2a96edad55cf2d03b54b5384e2ec5b4716369c3ea0ca139a273f96168e717c48fbb1039c11d10f6

    • SSDEEP

      1536:21+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:G+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks