General

  • Target

    21ed83dee79da533c27f042961468e5dfd9f14f4fc5a3f8178609bb14bc4d112N.exe

  • Size

    89KB

  • Sample

    241204-x98cpasrgk

  • MD5

    9406e631bc7280257aaf819dc14dd160

  • SHA1

    6dc27393b39e3d6051a926704d7763e01898b64d

  • SHA256

    21ed83dee79da533c27f042961468e5dfd9f14f4fc5a3f8178609bb14bc4d112

  • SHA512

    69831e195e51aed2c6dfcc932dfee97d12b8aa4fc1695fbbfecc4a8b14d205714447121bc2d46c2e673c1d4a7704f34a348d8f9fb5c5e34fec7d4bf985d668c1

  • SSDEEP

    1536:X1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:F+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      21ed83dee79da533c27f042961468e5dfd9f14f4fc5a3f8178609bb14bc4d112N.exe

    • Size

      89KB

    • MD5

      9406e631bc7280257aaf819dc14dd160

    • SHA1

      6dc27393b39e3d6051a926704d7763e01898b64d

    • SHA256

      21ed83dee79da533c27f042961468e5dfd9f14f4fc5a3f8178609bb14bc4d112

    • SHA512

      69831e195e51aed2c6dfcc932dfee97d12b8aa4fc1695fbbfecc4a8b14d205714447121bc2d46c2e673c1d4a7704f34a348d8f9fb5c5e34fec7d4bf985d668c1

    • SSDEEP

      1536:X1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:F+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks