General

  • Target

    c178f10337da03c1f13a402883b8b9d447d92543a75e435e16ab3841656a8382.exe

  • Size

    89KB

  • Sample

    241128-cr8khs1kg1

  • MD5

    4bfe39c9c1c70db52cbf4ae51b018fb6

  • SHA1

    dda499ab728163087869f70af77a427edb8f4b57

  • SHA256

    c178f10337da03c1f13a402883b8b9d447d92543a75e435e16ab3841656a8382

  • SHA512

    1f15f236300e17cfb381007d1273ef6b9d75c797a8023208c6d57b097e5e779700fc1ed8ab9d8de9c60213d8268484d609d8b425161629c6f28c867545e009b6

  • SSDEEP

    1536:21+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7O:G+4MJIkLZJNAQ9Jo9O

Malware Config

Targets

    • Target

      c178f10337da03c1f13a402883b8b9d447d92543a75e435e16ab3841656a8382.exe

    • Size

      89KB

    • MD5

      4bfe39c9c1c70db52cbf4ae51b018fb6

    • SHA1

      dda499ab728163087869f70af77a427edb8f4b57

    • SHA256

      c178f10337da03c1f13a402883b8b9d447d92543a75e435e16ab3841656a8382

    • SHA512

      1f15f236300e17cfb381007d1273ef6b9d75c797a8023208c6d57b097e5e779700fc1ed8ab9d8de9c60213d8268484d609d8b425161629c6f28c867545e009b6

    • SSDEEP

      1536:21+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7O:G+4MJIkLZJNAQ9Jo9O

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks