General

  • Target

    a9f65e7a6d5154fb82bf215d369f976f4a8737d52aa5cb43263c4b9c4d69b3db.exe

  • Size

    89KB

  • Sample

    241127-bm78hsyrav

  • MD5

    39477523fa23e22cb02c1d77dff6c492

  • SHA1

    029ecd085ba8d8a60d23eb471b24fbeade7e3cab

  • SHA256

    a9f65e7a6d5154fb82bf215d369f976f4a8737d52aa5cb43263c4b9c4d69b3db

  • SHA512

    b5438aaf59550da5e55359b0d130f2ccfb025dc41a72ef9812b0d2b42e7c1e67f92b100c3c19e3f4c546429231d26367798a1be20effc9d25f92b5a8d4d21072

  • SSDEEP

    1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:L+4MJIkLZJNAQ9Jo9+

Malware Config

Targets

    • Target

      a9f65e7a6d5154fb82bf215d369f976f4a8737d52aa5cb43263c4b9c4d69b3db.exe

    • Size

      89KB

    • MD5

      39477523fa23e22cb02c1d77dff6c492

    • SHA1

      029ecd085ba8d8a60d23eb471b24fbeade7e3cab

    • SHA256

      a9f65e7a6d5154fb82bf215d369f976f4a8737d52aa5cb43263c4b9c4d69b3db

    • SHA512

      b5438aaf59550da5e55359b0d130f2ccfb025dc41a72ef9812b0d2b42e7c1e67f92b100c3c19e3f4c546429231d26367798a1be20effc9d25f92b5a8d4d21072

    • SSDEEP

      1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:L+4MJIkLZJNAQ9Jo9+

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks