General

  • Target

    a9b286948672f6165188c6c1888faf98ad5e5e2ec4a34fb90d67e9daaec57506.exe

  • Size

    45KB

  • Sample

    241204-bcpcnatkfv

  • MD5

    f66e747314ab13ed85ccbb173e17627f

  • SHA1

    c73457ffcc48ed87ed566e248d8bde9229090d98

  • SHA256

    a9b286948672f6165188c6c1888faf98ad5e5e2ec4a34fb90d67e9daaec57506

  • SHA512

    2590fbda1db5c8408712abc6268d206ba88d9b4d4671ec410fa74b13e5ef9192199ed9427e9a84e413d553a5b68e3abb3a9da31517f560bbc11334b7187e9693

  • SSDEEP

    768:OhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:CsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

Malware Config

Targets

    • Target

      a9b286948672f6165188c6c1888faf98ad5e5e2ec4a34fb90d67e9daaec57506.exe

    • Size

      45KB

    • MD5

      f66e747314ab13ed85ccbb173e17627f

    • SHA1

      c73457ffcc48ed87ed566e248d8bde9229090d98

    • SHA256

      a9b286948672f6165188c6c1888faf98ad5e5e2ec4a34fb90d67e9daaec57506

    • SHA512

      2590fbda1db5c8408712abc6268d206ba88d9b4d4671ec410fa74b13e5ef9192199ed9427e9a84e413d553a5b68e3abb3a9da31517f560bbc11334b7187e9693

    • SSDEEP

      768:OhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:CsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks