General

  • Target

    0830b0682fda919d221d8ee1e94a502520eaa857d6228cef645595141bcafad0.exe

  • Size

    89KB

  • Sample

    241205-cdtt7sykbl

  • MD5

    ecda65e8cbac28b599492b88b6225ba2

  • SHA1

    034bf652609d125197cab71d2c67d903d81f2c4b

  • SHA256

    0830b0682fda919d221d8ee1e94a502520eaa857d6228cef645595141bcafad0

  • SHA512

    7f5fbae4a5f5ddc4de09c96e4cc2bf21a7e78f62ad5b82fb12100d4d522ab8f6496b254d355ad577b1d732c8aa8b066373c94785d691aff7a609dbf723f05e4d

  • SSDEEP

    1536:X1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:F+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      0830b0682fda919d221d8ee1e94a502520eaa857d6228cef645595141bcafad0.exe

    • Size

      89KB

    • MD5

      ecda65e8cbac28b599492b88b6225ba2

    • SHA1

      034bf652609d125197cab71d2c67d903d81f2c4b

    • SHA256

      0830b0682fda919d221d8ee1e94a502520eaa857d6228cef645595141bcafad0

    • SHA512

      7f5fbae4a5f5ddc4de09c96e4cc2bf21a7e78f62ad5b82fb12100d4d522ab8f6496b254d355ad577b1d732c8aa8b066373c94785d691aff7a609dbf723f05e4d

    • SSDEEP

      1536:X1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:F+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks