General

  • Target

    f1b786d875b7f3b43a7ca2c294c68be60d1194cfd0c4ae2ec39e2ba64afd9aeeN.exe

  • Size

    110KB

  • Sample

    241203-cs8xnsvnct

  • MD5

    ddd383b242d5f8324c97dd4b63e287f0

  • SHA1

    2bd82c1bd07031147ef0ffb4d77200ff801d4a39

  • SHA256

    f1b786d875b7f3b43a7ca2c294c68be60d1194cfd0c4ae2ec39e2ba64afd9aee

  • SHA512

    ba4ee5ffebe352147d44a0d72ec1d21246ed72b443ad41efd28158e00bed7b1aeb76873086276d27d234e8740e10db3a62ae384a7e257eea7ce46977a7ba26dd

  • SSDEEP

    1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:UiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      f1b786d875b7f3b43a7ca2c294c68be60d1194cfd0c4ae2ec39e2ba64afd9aeeN.exe

    • Size

      110KB

    • MD5

      ddd383b242d5f8324c97dd4b63e287f0

    • SHA1

      2bd82c1bd07031147ef0ffb4d77200ff801d4a39

    • SHA256

      f1b786d875b7f3b43a7ca2c294c68be60d1194cfd0c4ae2ec39e2ba64afd9aee

    • SHA512

      ba4ee5ffebe352147d44a0d72ec1d21246ed72b443ad41efd28158e00bed7b1aeb76873086276d27d234e8740e10db3a62ae384a7e257eea7ce46977a7ba26dd

    • SSDEEP

      1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:UiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks