General

  • Target

    ffd52f5485baf1e0624061cdd4493957c4022cec23eb0ffff273199bdcc10a0b.exe

  • Size

    34KB

  • Sample

    241201-fbfrcaxlaz

  • MD5

    d38cabfccadcce3d0fc9a4898078926a

  • SHA1

    8f6199ac81c5cb25120b7b1129b1ae79c1582742

  • SHA256

    ffd52f5485baf1e0624061cdd4493957c4022cec23eb0ffff273199bdcc10a0b

  • SHA512

    a7fc54bf4db9aa337d12e74672b1a7b605dfef2f5f510d36bfda1d594db07159263824b889ae6faa708bbe04758b2da638921c2da40108ea15b9fbdde8f281d0

  • SSDEEP

    768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:xpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      ffd52f5485baf1e0624061cdd4493957c4022cec23eb0ffff273199bdcc10a0b.exe

    • Size

      34KB

    • MD5

      d38cabfccadcce3d0fc9a4898078926a

    • SHA1

      8f6199ac81c5cb25120b7b1129b1ae79c1582742

    • SHA256

      ffd52f5485baf1e0624061cdd4493957c4022cec23eb0ffff273199bdcc10a0b

    • SHA512

      a7fc54bf4db9aa337d12e74672b1a7b605dfef2f5f510d36bfda1d594db07159263824b889ae6faa708bbe04758b2da638921c2da40108ea15b9fbdde8f281d0

    • SSDEEP

      768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:xpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks