General

  • Target

    d28225df828c12835ca794c740cd8d9fefef58cbeffe3a57c8cae227d6f28febN.exe

  • Size

    45KB

  • Sample

    241202-hkrlbatqdv

  • MD5

    2cf1e8b284a5e8480fca0539e6a73700

  • SHA1

    243925c8d7daaaf85a09f0333838a0462090ebe1

  • SHA256

    d28225df828c12835ca794c740cd8d9fefef58cbeffe3a57c8cae227d6f28feb

  • SHA512

    be6ee0d33292552fb8b87df22ba26caa188ddae43ac4a45694a4acbb016ceac59d4dcebb2fed789a965c687ded05b34ea9243f49c46490e5fe702237665c94f3

  • SSDEEP

    768:AhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:8sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      d28225df828c12835ca794c740cd8d9fefef58cbeffe3a57c8cae227d6f28febN.exe

    • Size

      45KB

    • MD5

      2cf1e8b284a5e8480fca0539e6a73700

    • SHA1

      243925c8d7daaaf85a09f0333838a0462090ebe1

    • SHA256

      d28225df828c12835ca794c740cd8d9fefef58cbeffe3a57c8cae227d6f28feb

    • SHA512

      be6ee0d33292552fb8b87df22ba26caa188ddae43ac4a45694a4acbb016ceac59d4dcebb2fed789a965c687ded05b34ea9243f49c46490e5fe702237665c94f3

    • SSDEEP

      768:AhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:8sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks