General

  • Target

    141f7cc06618c20466f7ae0a5e2324c497f07512287b4a47403c11333feed793N.exe

  • Size

    34KB

  • Sample

    241129-sprrzswrhq

  • MD5

    649c084c2c8b386c049de91c64e5e330

  • SHA1

    5791fc0dffd391aea6d32d7a29afa8106361e44e

  • SHA256

    141f7cc06618c20466f7ae0a5e2324c497f07512287b4a47403c11333feed793

  • SHA512

    415bdeacc162f433726cf1b3996619cb7e57d09bf092e2e487c90899b5aab118f9bbcd24a5277ff8502d0f108d017688557e29e695e64f97989013fd1fb5bb9f

  • SSDEEP

    768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:xpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      141f7cc06618c20466f7ae0a5e2324c497f07512287b4a47403c11333feed793N.exe

    • Size

      34KB

    • MD5

      649c084c2c8b386c049de91c64e5e330

    • SHA1

      5791fc0dffd391aea6d32d7a29afa8106361e44e

    • SHA256

      141f7cc06618c20466f7ae0a5e2324c497f07512287b4a47403c11333feed793

    • SHA512

      415bdeacc162f433726cf1b3996619cb7e57d09bf092e2e487c90899b5aab118f9bbcd24a5277ff8502d0f108d017688557e29e695e64f97989013fd1fb5bb9f

    • SSDEEP

      768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:xpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks