General

  • Target

    48a9d3fc99ea2d28eee65c913620ee0894e26f0ad44795420a34a83d4ebfe183N.exe

  • Size

    45KB

  • Sample

    241201-cel6raxnaj

  • MD5

    f7bdccb7da7410fd5b8209c1df4420b0

  • SHA1

    688d6e73e6eb938ded786cbbc549a690baaa8883

  • SHA256

    48a9d3fc99ea2d28eee65c913620ee0894e26f0ad44795420a34a83d4ebfe183

  • SHA512

    45468cedc98f31c8d53fca204782b9d766c54baf76600ef7774a899e9c2b9bfdd814629a2555d77d6eac9f51f91442331577219306fed162f95deb13279a26e0

  • SSDEEP

    768:JhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:TsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      48a9d3fc99ea2d28eee65c913620ee0894e26f0ad44795420a34a83d4ebfe183N.exe

    • Size

      45KB

    • MD5

      f7bdccb7da7410fd5b8209c1df4420b0

    • SHA1

      688d6e73e6eb938ded786cbbc549a690baaa8883

    • SHA256

      48a9d3fc99ea2d28eee65c913620ee0894e26f0ad44795420a34a83d4ebfe183

    • SHA512

      45468cedc98f31c8d53fca204782b9d766c54baf76600ef7774a899e9c2b9bfdd814629a2555d77d6eac9f51f91442331577219306fed162f95deb13279a26e0

    • SSDEEP

      768:JhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:TsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks