General

  • Target

    840e5ea1b77c452c2316ab7e534d54eeed93ca78b7fbf3ffa2dd39f73517ed87.exe

  • Size

    110KB

  • Sample

    241205-csvp2szjan

  • MD5

    c352c69f55318bdb2a72c0e42ef3c219

  • SHA1

    41de413fb7f21c0f332cc43e045fd23a2ace0b69

  • SHA256

    840e5ea1b77c452c2316ab7e534d54eeed93ca78b7fbf3ffa2dd39f73517ed87

  • SHA512

    f4182e079ccb127af33cb6c18317b14e5761d59b2cdd170280a187ed4167a212462669c059e6341e388342af788a6687044d2dd8d307dda397917ddd5f3d100e

  • SSDEEP

    1536:hiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:hiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      840e5ea1b77c452c2316ab7e534d54eeed93ca78b7fbf3ffa2dd39f73517ed87.exe

    • Size

      110KB

    • MD5

      c352c69f55318bdb2a72c0e42ef3c219

    • SHA1

      41de413fb7f21c0f332cc43e045fd23a2ace0b69

    • SHA256

      840e5ea1b77c452c2316ab7e534d54eeed93ca78b7fbf3ffa2dd39f73517ed87

    • SHA512

      f4182e079ccb127af33cb6c18317b14e5761d59b2cdd170280a187ed4167a212462669c059e6341e388342af788a6687044d2dd8d307dda397917ddd5f3d100e

    • SSDEEP

      1536:hiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:hiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks