General

  • Target

    2be58312c77d6a8598532a94742141f8eb09227f71dd89fdb3c0f6622cca2a44N.exe

  • Size

    110KB

  • Sample

    241201-qg9aysskdt

  • MD5

    5be661cf4b407b1ec259708e8173fab0

  • SHA1

    d4be6a1c41b626ddf2f24feeee0ae9763f217c1a

  • SHA256

    2be58312c77d6a8598532a94742141f8eb09227f71dd89fdb3c0f6622cca2a44

  • SHA512

    99fe56e671f05ed6f3e7816b9e8ef1b1dc06369c2c8969c8bd0a3a5e9fb97af3e98d0e9dc732808403eb04d1f1171bfb4b83ed3b8f112f3a7fe42c7ace736d6d

  • SSDEEP

    1536:8iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:8iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      2be58312c77d6a8598532a94742141f8eb09227f71dd89fdb3c0f6622cca2a44N.exe

    • Size

      110KB

    • MD5

      5be661cf4b407b1ec259708e8173fab0

    • SHA1

      d4be6a1c41b626ddf2f24feeee0ae9763f217c1a

    • SHA256

      2be58312c77d6a8598532a94742141f8eb09227f71dd89fdb3c0f6622cca2a44

    • SHA512

      99fe56e671f05ed6f3e7816b9e8ef1b1dc06369c2c8969c8bd0a3a5e9fb97af3e98d0e9dc732808403eb04d1f1171bfb4b83ed3b8f112f3a7fe42c7ace736d6d

    • SSDEEP

      1536:8iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:8iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks