General

  • Target

    ea17fa27703fdad33468be39c4417356575c381d3c7236d37186f69005d3aa7b.exe

  • Size

    89KB

  • Sample

    241205-kawhmaslcj

  • MD5

    bb1fc05bfb1d216f1a59ad5d1f1fc332

  • SHA1

    ceab0163be9607d3bcea1470e634108a821b9d16

  • SHA256

    ea17fa27703fdad33468be39c4417356575c381d3c7236d37186f69005d3aa7b

  • SHA512

    698ee34b1275bc200c0cae5a5a1e7be5fcb36d8914ac6b0866d5234db8f90d194dda6f7cf0f737ed4b55911040712db93f1e61dce4790f5ca453be4230bb64ac

  • SSDEEP

    1536:j1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:J+4MJIkLZJNAQ9Jo9u

Malware Config

Targets

    • Target

      ea17fa27703fdad33468be39c4417356575c381d3c7236d37186f69005d3aa7b.exe

    • Size

      89KB

    • MD5

      bb1fc05bfb1d216f1a59ad5d1f1fc332

    • SHA1

      ceab0163be9607d3bcea1470e634108a821b9d16

    • SHA256

      ea17fa27703fdad33468be39c4417356575c381d3c7236d37186f69005d3aa7b

    • SHA512

      698ee34b1275bc200c0cae5a5a1e7be5fcb36d8914ac6b0866d5234db8f90d194dda6f7cf0f737ed4b55911040712db93f1e61dce4790f5ca453be4230bb64ac

    • SSDEEP

      1536:j1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:J+4MJIkLZJNAQ9Jo9u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks