General

  • Target

    e684f8884b8b8ef675260b52cd8c9eeae88fdf79d39a8516006b5b14226f175cN.exe

  • Size

    89KB

  • Sample

    241205-23s2mswrcx

  • MD5

    90adae11f00b9a4713a890cb67c4c9d0

  • SHA1

    42d2ab07301ea09496a972a2f637f469a573947c

  • SHA256

    e684f8884b8b8ef675260b52cd8c9eeae88fdf79d39a8516006b5b14226f175c

  • SHA512

    ea53a01a136cd90cf35fd5f631c907cc034e2b4c3f99dedf7fd1d1c6481ef963121d71620ed54a0a435b5c89ac2b15cfa77e9a30f12be3c8f40580f53e9bd16c

  • SSDEEP

    1536:j1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:J+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      e684f8884b8b8ef675260b52cd8c9eeae88fdf79d39a8516006b5b14226f175cN.exe

    • Size

      89KB

    • MD5

      90adae11f00b9a4713a890cb67c4c9d0

    • SHA1

      42d2ab07301ea09496a972a2f637f469a573947c

    • SHA256

      e684f8884b8b8ef675260b52cd8c9eeae88fdf79d39a8516006b5b14226f175c

    • SHA512

      ea53a01a136cd90cf35fd5f631c907cc034e2b4c3f99dedf7fd1d1c6481ef963121d71620ed54a0a435b5c89ac2b15cfa77e9a30f12be3c8f40580f53e9bd16c

    • SSDEEP

      1536:j1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:J+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks