General

  • Target

    aac4a2a3c15952707a02340060cc7e959d556a342261c8665a4e5868f9053146.exe

  • Size

    45KB

  • Sample

    241127-bk75qsyqb1

  • MD5

    c14ecc42bfdbff3c640b8357f73d8642

  • SHA1

    f0d0da1d055ab712413ca22a6f085bf99e84c6b1

  • SHA256

    aac4a2a3c15952707a02340060cc7e959d556a342261c8665a4e5868f9053146

  • SHA512

    898146d2394a4368061b9bb01a36a7e7c45333d0f449c94e013e41bb4d06d99e17ff6696cdd95569d66a4f9d0dd7429282353a74876ca72af4b73a1942aa47c2

  • SSDEEP

    768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qL

Malware Config

Targets

    • Target

      aac4a2a3c15952707a02340060cc7e959d556a342261c8665a4e5868f9053146.exe

    • Size

      45KB

    • MD5

      c14ecc42bfdbff3c640b8357f73d8642

    • SHA1

      f0d0da1d055ab712413ca22a6f085bf99e84c6b1

    • SHA256

      aac4a2a3c15952707a02340060cc7e959d556a342261c8665a4e5868f9053146

    • SHA512

      898146d2394a4368061b9bb01a36a7e7c45333d0f449c94e013e41bb4d06d99e17ff6696cdd95569d66a4f9d0dd7429282353a74876ca72af4b73a1942aa47c2

    • SSDEEP

      768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qL

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks