General

  • Target

    e42227a525e742f33cfa79d27c38ec6616e112343b58938693ab8c6bca08d970.exe

  • Size

    45KB

  • Sample

    241126-v85t3a1phx

  • MD5

    755f7f8bbc212a8f06ed1de0526c0039

  • SHA1

    3e5965ae93448aed5bd49b4ad91d84a5ce0287d2

  • SHA256

    e42227a525e742f33cfa79d27c38ec6616e112343b58938693ab8c6bca08d970

  • SHA512

    b87b7e79a0be521a28545aa29303f9f2422776691205bb17778fb04d2030a4effded8c13278d27033d1a7d480e3f347ce1b3b1c7ba3b725c022a1e4247b2d0f0

  • SSDEEP

    768:ohP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:UsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

Malware Config

Targets

    • Target

      e42227a525e742f33cfa79d27c38ec6616e112343b58938693ab8c6bca08d970.exe

    • Size

      45KB

    • MD5

      755f7f8bbc212a8f06ed1de0526c0039

    • SHA1

      3e5965ae93448aed5bd49b4ad91d84a5ce0287d2

    • SHA256

      e42227a525e742f33cfa79d27c38ec6616e112343b58938693ab8c6bca08d970

    • SHA512

      b87b7e79a0be521a28545aa29303f9f2422776691205bb17778fb04d2030a4effded8c13278d27033d1a7d480e3f347ce1b3b1c7ba3b725c022a1e4247b2d0f0

    • SSDEEP

      768:ohP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:UsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks