General

  • Target

    7a8b5ceb51215f4ffde73bb5cafbdbb7b4f3a675b4596d29462105b2f850b3e4N.exe

  • Size

    45KB

  • Sample

    241127-aphj7sxkhy

  • MD5

    79f2bbbe05c55035dfd1d72098e207b0

  • SHA1

    54fe5642b4377442d27047c998e8a808ffbd2bc5

  • SHA256

    7a8b5ceb51215f4ffde73bb5cafbdbb7b4f3a675b4596d29462105b2f850b3e4

  • SHA512

    18f3a6ede2ec7d0ea454231a645ebe1a12364abf49cd0b34c1602d33019be9c7dd5c17cb51702ecaded832b184ac82eac4688b1a2eb8199b41a23bd7c0c02726

  • SSDEEP

    768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      7a8b5ceb51215f4ffde73bb5cafbdbb7b4f3a675b4596d29462105b2f850b3e4N.exe

    • Size

      45KB

    • MD5

      79f2bbbe05c55035dfd1d72098e207b0

    • SHA1

      54fe5642b4377442d27047c998e8a808ffbd2bc5

    • SHA256

      7a8b5ceb51215f4ffde73bb5cafbdbb7b4f3a675b4596d29462105b2f850b3e4

    • SHA512

      18f3a6ede2ec7d0ea454231a645ebe1a12364abf49cd0b34c1602d33019be9c7dd5c17cb51702ecaded832b184ac82eac4688b1a2eb8199b41a23bd7c0c02726

    • SSDEEP

      768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks