General

  • Target

    f759fd2d7484ec67652760f5b6c684eb9546a2ab53bb9e9c82ef5c1c58121096.exe

  • Size

    110KB

  • Sample

    241204-eenexszrbz

  • MD5

    c989c63924b1b00b68e1cb3b7669383d

  • SHA1

    81a7e83b38e3f1db2f2bf05bf88cf3243a65da71

  • SHA256

    f759fd2d7484ec67652760f5b6c684eb9546a2ab53bb9e9c82ef5c1c58121096

  • SHA512

    0023eadb71a671e890c7bd889a34be6cece52cbaac03c1f6a9ed87dafc2a3ab6cc7df8ec47c4e0a7a3a42c3a54779b794ba88ebbcba717337ed040fe9313235d

  • SSDEEP

    1536:8iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:8iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      f759fd2d7484ec67652760f5b6c684eb9546a2ab53bb9e9c82ef5c1c58121096.exe

    • Size

      110KB

    • MD5

      c989c63924b1b00b68e1cb3b7669383d

    • SHA1

      81a7e83b38e3f1db2f2bf05bf88cf3243a65da71

    • SHA256

      f759fd2d7484ec67652760f5b6c684eb9546a2ab53bb9e9c82ef5c1c58121096

    • SHA512

      0023eadb71a671e890c7bd889a34be6cece52cbaac03c1f6a9ed87dafc2a3ab6cc7df8ec47c4e0a7a3a42c3a54779b794ba88ebbcba717337ed040fe9313235d

    • SSDEEP

      1536:8iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:8iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks