General

  • Target

    14c2506e8adf9b537cdc926e24e77ecb21083003a05b870c075e80eb77004fe5N.exe

  • Size

    110KB

  • Sample

    241204-z6k44axngk

  • MD5

    d53b0e0f20d0de458a5bbf575a397690

  • SHA1

    75c718aff0b1019d747fabe5dcd0d89ba8c7d89f

  • SHA256

    14c2506e8adf9b537cdc926e24e77ecb21083003a05b870c075e80eb77004fe5

  • SHA512

    a941c8625e294229c2bc1dd2db420aa5e49c08a01b3c1af8d58c8dbc707425bd3911f2a828007cfc553667eee900345ce3c17cd3bb98285c02da7548cc269842

  • SSDEEP

    1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      14c2506e8adf9b537cdc926e24e77ecb21083003a05b870c075e80eb77004fe5N.exe

    • Size

      110KB

    • MD5

      d53b0e0f20d0de458a5bbf575a397690

    • SHA1

      75c718aff0b1019d747fabe5dcd0d89ba8c7d89f

    • SHA256

      14c2506e8adf9b537cdc926e24e77ecb21083003a05b870c075e80eb77004fe5

    • SHA512

      a941c8625e294229c2bc1dd2db420aa5e49c08a01b3c1af8d58c8dbc707425bd3911f2a828007cfc553667eee900345ce3c17cd3bb98285c02da7548cc269842

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks