General

  • Target

    69ce276a4f62915c2257bee72bae6cdff0b4e0da512077e2cbea22f9a405adfbN.exe

  • Size

    110KB

  • Sample

    241205-1k3bxstjht

  • MD5

    63166be45b5df82639dae01965f6d510

  • SHA1

    8ec5bf4c06908e3ef680c0425dfdf7b7e4a90f56

  • SHA256

    69ce276a4f62915c2257bee72bae6cdff0b4e0da512077e2cbea22f9a405adfb

  • SHA512

    484be68dc239e3d6bf0ad620a700e17aa372f79ed4bd217a84c7bedbbf2414c4201c3b89b6102b56a5ca17fde1a82c573514a22bfe69f220dd43fe56f731f36c

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:liyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      69ce276a4f62915c2257bee72bae6cdff0b4e0da512077e2cbea22f9a405adfbN.exe

    • Size

      110KB

    • MD5

      63166be45b5df82639dae01965f6d510

    • SHA1

      8ec5bf4c06908e3ef680c0425dfdf7b7e4a90f56

    • SHA256

      69ce276a4f62915c2257bee72bae6cdff0b4e0da512077e2cbea22f9a405adfb

    • SHA512

      484be68dc239e3d6bf0ad620a700e17aa372f79ed4bd217a84c7bedbbf2414c4201c3b89b6102b56a5ca17fde1a82c573514a22bfe69f220dd43fe56f731f36c

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:liyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks