General

  • Target

    9bd693d80028e360c73e9ac0a9913c7ec914392bf351bb15ed70ac80ac601546N.exe

  • Size

    110KB

  • Sample

    241127-tvwhss1lcy

  • MD5

    d753df801c632c8d872f841ea2393bb0

  • SHA1

    005355f720a647f7b5f14ae812b207fc3627c67b

  • SHA256

    9bd693d80028e360c73e9ac0a9913c7ec914392bf351bb15ed70ac80ac601546

  • SHA512

    8e1e4754932bd74def2340ff895e01784337f92942b6d19c452e1a5026177e3e55043b750a354817fc2e410ae67107b919b443e5df825cc05ba7fb46a3e27155

  • SSDEEP

    1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:YiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      9bd693d80028e360c73e9ac0a9913c7ec914392bf351bb15ed70ac80ac601546N.exe

    • Size

      110KB

    • MD5

      d753df801c632c8d872f841ea2393bb0

    • SHA1

      005355f720a647f7b5f14ae812b207fc3627c67b

    • SHA256

      9bd693d80028e360c73e9ac0a9913c7ec914392bf351bb15ed70ac80ac601546

    • SHA512

      8e1e4754932bd74def2340ff895e01784337f92942b6d19c452e1a5026177e3e55043b750a354817fc2e410ae67107b919b443e5df825cc05ba7fb46a3e27155

    • SSDEEP

      1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:YiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks