General

  • Target

    fc66a916ccab14beb3c0646965fcf03b1ff126c758cfcada224cb052ee1e7668N.exe

  • Size

    34KB

  • Sample

    241202-p4et7atqas

  • MD5

    fd90c736bfdce787c3b3ddc2e48f9270

  • SHA1

    0745ad1f6dd1f1c276c46b5c35a8ba2b9df00c1b

  • SHA256

    fc66a916ccab14beb3c0646965fcf03b1ff126c758cfcada224cb052ee1e7668

  • SHA512

    be61b791cccd62ae40d361da599b30e041819f21f3ad6bc7065d6135ca7e924f106c9325b4b772e44ad1e386aa08afb9c96430a40fc4ac5f71643f7b30a1a733

  • SSDEEP

    768:Lp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:LpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      fc66a916ccab14beb3c0646965fcf03b1ff126c758cfcada224cb052ee1e7668N.exe

    • Size

      34KB

    • MD5

      fd90c736bfdce787c3b3ddc2e48f9270

    • SHA1

      0745ad1f6dd1f1c276c46b5c35a8ba2b9df00c1b

    • SHA256

      fc66a916ccab14beb3c0646965fcf03b1ff126c758cfcada224cb052ee1e7668

    • SHA512

      be61b791cccd62ae40d361da599b30e041819f21f3ad6bc7065d6135ca7e924f106c9325b4b772e44ad1e386aa08afb9c96430a40fc4ac5f71643f7b30a1a733

    • SSDEEP

      768:Lp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:LpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks