General

  • Target

    6896f4b6551654987c92f552185f4cc21319cc4b44b078aaaa3e0bbf9d53a95eN.exe

  • Size

    34KB

  • Sample

    241126-24sr9svjcz

  • MD5

    bfdf38d021bd7cbb00a69ca27e20d510

  • SHA1

    34796c363ccbb7286c3394570b736dbfcbe6ee54

  • SHA256

    6896f4b6551654987c92f552185f4cc21319cc4b44b078aaaa3e0bbf9d53a95e

  • SHA512

    2b714ce23a326cbbcf80832e0e1f70e6e625ebaaa6e8138462b17b98f4caba319d86c12f7fc3a613b702fd2d51d579f03beff9a14f741970f5ea7cad4add2da5

  • SSDEEP

    768:Bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:BpYoX58z1uirL98xMWnT0OQ9JW

Malware Config

Targets

    • Target

      6896f4b6551654987c92f552185f4cc21319cc4b44b078aaaa3e0bbf9d53a95eN.exe

    • Size

      34KB

    • MD5

      bfdf38d021bd7cbb00a69ca27e20d510

    • SHA1

      34796c363ccbb7286c3394570b736dbfcbe6ee54

    • SHA256

      6896f4b6551654987c92f552185f4cc21319cc4b44b078aaaa3e0bbf9d53a95e

    • SHA512

      2b714ce23a326cbbcf80832e0e1f70e6e625ebaaa6e8138462b17b98f4caba319d86c12f7fc3a613b702fd2d51d579f03beff9a14f741970f5ea7cad4add2da5

    • SSDEEP

      768:Bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:BpYoX58z1uirL98xMWnT0OQ9JW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks