General

  • Target

    acc45a533bdd8874c0bb5674abf38c50e4f1ceda5b0463bedc380d1631f9881fN.exe

  • Size

    34KB

  • Sample

    241202-wwz9gswkey

  • MD5

    1d2d3fc8d2bc18d5d2c3fbc0c55653a0

  • SHA1

    0ff31436cf93e8487ccd29795ecb1d45cf19356c

  • SHA256

    acc45a533bdd8874c0bb5674abf38c50e4f1ceda5b0463bedc380d1631f9881f

  • SHA512

    ffd2aa4c19d6b7ae08efa838e412d03c701924b19cd999e52ab629ac84ea653218da6ba4970e4f71989fc42d57fa933e520ac0903156fb6436133692f0e8b2a4

  • SSDEEP

    768:Wp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:WpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      acc45a533bdd8874c0bb5674abf38c50e4f1ceda5b0463bedc380d1631f9881fN.exe

    • Size

      34KB

    • MD5

      1d2d3fc8d2bc18d5d2c3fbc0c55653a0

    • SHA1

      0ff31436cf93e8487ccd29795ecb1d45cf19356c

    • SHA256

      acc45a533bdd8874c0bb5674abf38c50e4f1ceda5b0463bedc380d1631f9881f

    • SHA512

      ffd2aa4c19d6b7ae08efa838e412d03c701924b19cd999e52ab629ac84ea653218da6ba4970e4f71989fc42d57fa933e520ac0903156fb6436133692f0e8b2a4

    • SSDEEP

      768:Wp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:WpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks