General

  • Target

    6dac04098c43ae071ecbac53b840d2a31d8183e065b98169a943f89d4b9023e0N.exe

  • Size

    89KB

  • Sample

    241205-m1w8ys1nbx

  • MD5

    8fa728d81f351464674673084c27b1e0

  • SHA1

    f48241622ea5dd478c3028a1bbce1c893504c12d

  • SHA256

    6dac04098c43ae071ecbac53b840d2a31d8183e065b98169a943f89d4b9023e0

  • SHA512

    b4ddb0654d98280e14bba8132dd0f94b89e823b81d8b28a3e77b3d45712e3c4678d205a4f201f9eb64c5800d926774f737ac295843bb53623319884f5eda3d63

  • SSDEEP

    1536:D1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7O:p+4MJIkLZJNAQ9Jo9O

Malware Config

Targets

    • Target

      6dac04098c43ae071ecbac53b840d2a31d8183e065b98169a943f89d4b9023e0N.exe

    • Size

      89KB

    • MD5

      8fa728d81f351464674673084c27b1e0

    • SHA1

      f48241622ea5dd478c3028a1bbce1c893504c12d

    • SHA256

      6dac04098c43ae071ecbac53b840d2a31d8183e065b98169a943f89d4b9023e0

    • SHA512

      b4ddb0654d98280e14bba8132dd0f94b89e823b81d8b28a3e77b3d45712e3c4678d205a4f201f9eb64c5800d926774f737ac295843bb53623319884f5eda3d63

    • SSDEEP

      1536:D1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7O:p+4MJIkLZJNAQ9Jo9O

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks