General

  • Target

    4cb9b401015970841822590c39a67da14af839f910897e650f5c9e97be979a50.exe

  • Size

    110KB

  • Sample

    241204-3ftkbswqfs

  • MD5

    cad9ce3a63f8a5a20e8cb281387453fa

  • SHA1

    0cd8ec11d735d86e7b62419f54659a1ebe6dc8a9

  • SHA256

    4cb9b401015970841822590c39a67da14af839f910897e650f5c9e97be979a50

  • SHA512

    6e37b9c14bcff0ecd9d88326e14d012017cb1f0503bd579e478173f8cfc4ebbb11310eb3d235a3b50add50f6ac830b63893d345c83b4a550a8ebdf154321af83

  • SSDEEP

    1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:GiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      4cb9b401015970841822590c39a67da14af839f910897e650f5c9e97be979a50.exe

    • Size

      110KB

    • MD5

      cad9ce3a63f8a5a20e8cb281387453fa

    • SHA1

      0cd8ec11d735d86e7b62419f54659a1ebe6dc8a9

    • SHA256

      4cb9b401015970841822590c39a67da14af839f910897e650f5c9e97be979a50

    • SHA512

      6e37b9c14bcff0ecd9d88326e14d012017cb1f0503bd579e478173f8cfc4ebbb11310eb3d235a3b50add50f6ac830b63893d345c83b4a550a8ebdf154321af83

    • SSDEEP

      1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:GiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks