General

  • Target

    d743c36d3a7a4ba8052ca9f7b047f3d7b74e3601b5ad09900c8aac7909ac840d.exe

  • Size

    110KB

  • Sample

    241204-kcmnhazjez

  • MD5

    9dedfbcf6bef49798b1b7dcd3556619f

  • SHA1

    4e89f5e31380de08743720aee7f547cce7fe4c82

  • SHA256

    d743c36d3a7a4ba8052ca9f7b047f3d7b74e3601b5ad09900c8aac7909ac840d

  • SHA512

    7fb92bcc9ae4dbd365762fad735e988874cf9aa16635f6eb2879411ecad9a5f004882c5576a8600d937f5800c841d1e8902b629cb990fbb1487886debe94ce84

  • SSDEEP

    1536:CiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:CiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      d743c36d3a7a4ba8052ca9f7b047f3d7b74e3601b5ad09900c8aac7909ac840d.exe

    • Size

      110KB

    • MD5

      9dedfbcf6bef49798b1b7dcd3556619f

    • SHA1

      4e89f5e31380de08743720aee7f547cce7fe4c82

    • SHA256

      d743c36d3a7a4ba8052ca9f7b047f3d7b74e3601b5ad09900c8aac7909ac840d

    • SHA512

      7fb92bcc9ae4dbd365762fad735e988874cf9aa16635f6eb2879411ecad9a5f004882c5576a8600d937f5800c841d1e8902b629cb990fbb1487886debe94ce84

    • SSDEEP

      1536:CiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:CiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks