General

  • Target

    559264a82c150d5b658083ca57f764b62cd37077f86dbb6029b5cbc7500494ed.exe

  • Size

    110KB

  • Sample

    241128-g5ydxsvlgj

  • MD5

    2d2b55cf3d94c834e3727a49b769c6cf

  • SHA1

    6e77f7fc6828e8171387fff3b7bb73cb3a429ca6

  • SHA256

    559264a82c150d5b658083ca57f764b62cd37077f86dbb6029b5cbc7500494ed

  • SHA512

    2c4faf05e9206a7626cd0573685a919be0920baad40aaa486891ad020a8d6687af464094d0c68ecea2dddec5e7747e098a1c89d997c9f32c96ebedb8522d6f2f

  • SSDEEP

    1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:YiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      559264a82c150d5b658083ca57f764b62cd37077f86dbb6029b5cbc7500494ed.exe

    • Size

      110KB

    • MD5

      2d2b55cf3d94c834e3727a49b769c6cf

    • SHA1

      6e77f7fc6828e8171387fff3b7bb73cb3a429ca6

    • SHA256

      559264a82c150d5b658083ca57f764b62cd37077f86dbb6029b5cbc7500494ed

    • SHA512

      2c4faf05e9206a7626cd0573685a919be0920baad40aaa486891ad020a8d6687af464094d0c68ecea2dddec5e7747e098a1c89d997c9f32c96ebedb8522d6f2f

    • SSDEEP

      1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:YiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks