General

  • Target

    185f1b7c8c183f47d25e1b1729d4cdc39375735fb11bad4a20d83d46e555bc20.exe

  • Size

    45KB

  • Sample

    241128-kxxzzasmcy

  • MD5

    de22823a871b415d4c1ccf7b23914d3c

  • SHA1

    9d63614971975fc985a05a1e81e536178cdc821a

  • SHA256

    185f1b7c8c183f47d25e1b1729d4cdc39375735fb11bad4a20d83d46e555bc20

  • SHA512

    7438a484c19c2cad25e4c3108a4fb64ef76ba1fbf9470053773489516f17fcc1260011bef98dbfe92538c283104ad0a3cbf2d48d970608333bfb908303c3040a

  • SSDEEP

    768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:ksWE9N5dFu53dsniQaB/xZ14n7zIF+q7

Malware Config

Targets

    • Target

      185f1b7c8c183f47d25e1b1729d4cdc39375735fb11bad4a20d83d46e555bc20.exe

    • Size

      45KB

    • MD5

      de22823a871b415d4c1ccf7b23914d3c

    • SHA1

      9d63614971975fc985a05a1e81e536178cdc821a

    • SHA256

      185f1b7c8c183f47d25e1b1729d4cdc39375735fb11bad4a20d83d46e555bc20

    • SHA512

      7438a484c19c2cad25e4c3108a4fb64ef76ba1fbf9470053773489516f17fcc1260011bef98dbfe92538c283104ad0a3cbf2d48d970608333bfb908303c3040a

    • SSDEEP

      768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:ksWE9N5dFu53dsniQaB/xZ14n7zIF+q7

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks