General

  • Target

    f142d814b4c0ce968f1151453552e49f57e1b35cf86a8366ecaa3199159bd3b6.exe

  • Size

    45KB

  • Sample

    241127-3vnmmawmdx

  • MD5

    f5ccb5022d2af284ef1112ad3338584f

  • SHA1

    e69b655e9c8a474d8ea55a8e5215f195564ac0b0

  • SHA256

    f142d814b4c0ce968f1151453552e49f57e1b35cf86a8366ecaa3199159bd3b6

  • SHA512

    2b2a9be8ad3b8ac650a499221b21e2b337318e24337ef734d8ca47e3ec8958a6be07de20d8d188be4076ae1a4c2e0e1697063ec04fa27fe19ceb652592475346

  • SSDEEP

    768:uhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2l:isWE9N5dFu53dsniQaB/xZ14n7zIF+qp

Malware Config

Targets

    • Target

      f142d814b4c0ce968f1151453552e49f57e1b35cf86a8366ecaa3199159bd3b6.exe

    • Size

      45KB

    • MD5

      f5ccb5022d2af284ef1112ad3338584f

    • SHA1

      e69b655e9c8a474d8ea55a8e5215f195564ac0b0

    • SHA256

      f142d814b4c0ce968f1151453552e49f57e1b35cf86a8366ecaa3199159bd3b6

    • SHA512

      2b2a9be8ad3b8ac650a499221b21e2b337318e24337ef734d8ca47e3ec8958a6be07de20d8d188be4076ae1a4c2e0e1697063ec04fa27fe19ceb652592475346

    • SSDEEP

      768:uhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2l:isWE9N5dFu53dsniQaB/xZ14n7zIF+qp

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks