General

  • Target

    c4a1c138e34471834dbfdc40011ddd62f4afde182e98b4bf12cf58e4a5f97beaN.exe

  • Size

    89KB

  • Sample

    241202-e6xsnsvpcl

  • MD5

    cba9453d643237602103784dff62b2f0

  • SHA1

    c0211db01c2ffe3ea680d6febf64603ecb1f043e

  • SHA256

    c4a1c138e34471834dbfdc40011ddd62f4afde182e98b4bf12cf58e4a5f97bea

  • SHA512

    3f09cd9ef81f244a4afef4ab1c15134c3650ab31b05c342eac69ff79d27b1a4ceb590993f02132d911854b6a18a830fa6f4ec2a5dee8cef4defc8a4c34b5f5cc

  • SSDEEP

    1536:f1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:d+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      c4a1c138e34471834dbfdc40011ddd62f4afde182e98b4bf12cf58e4a5f97beaN.exe

    • Size

      89KB

    • MD5

      cba9453d643237602103784dff62b2f0

    • SHA1

      c0211db01c2ffe3ea680d6febf64603ecb1f043e

    • SHA256

      c4a1c138e34471834dbfdc40011ddd62f4afde182e98b4bf12cf58e4a5f97bea

    • SHA512

      3f09cd9ef81f244a4afef4ab1c15134c3650ab31b05c342eac69ff79d27b1a4ceb590993f02132d911854b6a18a830fa6f4ec2a5dee8cef4defc8a4c34b5f5cc

    • SSDEEP

      1536:f1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:d+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks