General

  • Target

    dff7d0d4e226898258318c400b4a114eda9f23ad8358e9dead4969ebf8ed9153.exe

  • Size

    34KB

  • Sample

    241202-t68x9ssmev

  • MD5

    86d18bd28889180f5c4f041caa5cbcc4

  • SHA1

    946999f726f5885c625a1d4e9423d97eb768ccbe

  • SHA256

    dff7d0d4e226898258318c400b4a114eda9f23ad8358e9dead4969ebf8ed9153

  • SHA512

    87a7518666cd9858973d87252d7a53cbfd96a1d66a584b0067f265b2a11db6d00ea81f1a2a073ab68880b5157f4f25d19bcdd391c9c06c591a981c625bae3a69

  • SSDEEP

    768:Wp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JG:WpYoX58z1uirL98xMWnT0OQ9JG

Malware Config

Targets

    • Target

      dff7d0d4e226898258318c400b4a114eda9f23ad8358e9dead4969ebf8ed9153.exe

    • Size

      34KB

    • MD5

      86d18bd28889180f5c4f041caa5cbcc4

    • SHA1

      946999f726f5885c625a1d4e9423d97eb768ccbe

    • SHA256

      dff7d0d4e226898258318c400b4a114eda9f23ad8358e9dead4969ebf8ed9153

    • SHA512

      87a7518666cd9858973d87252d7a53cbfd96a1d66a584b0067f265b2a11db6d00ea81f1a2a073ab68880b5157f4f25d19bcdd391c9c06c591a981c625bae3a69

    • SSDEEP

      768:Wp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JG:WpYoX58z1uirL98xMWnT0OQ9JG

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks