General

  • Target

    c85bad2f2c27dcc40bf728fe7a242c74a2fdd222ea631603d6225bbaba89c299N.exe

  • Size

    110KB

  • Sample

    241202-vdbmqssqct

  • MD5

    f29ddb71e5dadf1e58c44421c9e24af0

  • SHA1

    dd338a2cd11386158365b6c84adb348d1a0baccd

  • SHA256

    c85bad2f2c27dcc40bf728fe7a242c74a2fdd222ea631603d6225bbaba89c299

  • SHA512

    0f36945698f442f6b780766dacadf663fb2a9ebf11b461e3fa3196888ee83e0a990c83253d830a3585efa16a6d6a14ac0a50ec8e6dd653df2c83a83b1b230773

  • SSDEEP

    1536:CiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:CiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      c85bad2f2c27dcc40bf728fe7a242c74a2fdd222ea631603d6225bbaba89c299N.exe

    • Size

      110KB

    • MD5

      f29ddb71e5dadf1e58c44421c9e24af0

    • SHA1

      dd338a2cd11386158365b6c84adb348d1a0baccd

    • SHA256

      c85bad2f2c27dcc40bf728fe7a242c74a2fdd222ea631603d6225bbaba89c299

    • SHA512

      0f36945698f442f6b780766dacadf663fb2a9ebf11b461e3fa3196888ee83e0a990c83253d830a3585efa16a6d6a14ac0a50ec8e6dd653df2c83a83b1b230773

    • SSDEEP

      1536:CiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:CiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks