General

  • Target

    4a92e331d6082c60fd00a0496c5e29b6a404e6eb793258ddbce25d1cf700607cN.exe

  • Size

    34KB

  • Sample

    241205-nr6lpsynhq

  • MD5

    d7e9e428085f0d3b894f9111601f92b0

  • SHA1

    ffd172d105fce6c75e1012bb811af8e7021d07c1

  • SHA256

    4a92e331d6082c60fd00a0496c5e29b6a404e6eb793258ddbce25d1cf700607c

  • SHA512

    3a5fa52b1b871aa4433d2cc482431cd1511924038a05f1dca5b71008cef6fc25f8a788c190de887d364f1952e8abe86d73452926d35909ed60ac29bcb8f48e5c

  • SSDEEP

    768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jy:xpYoX58z1uirL98xMWnT0OQ9Jy

Malware Config

Targets

    • Target

      4a92e331d6082c60fd00a0496c5e29b6a404e6eb793258ddbce25d1cf700607cN.exe

    • Size

      34KB

    • MD5

      d7e9e428085f0d3b894f9111601f92b0

    • SHA1

      ffd172d105fce6c75e1012bb811af8e7021d07c1

    • SHA256

      4a92e331d6082c60fd00a0496c5e29b6a404e6eb793258ddbce25d1cf700607c

    • SHA512

      3a5fa52b1b871aa4433d2cc482431cd1511924038a05f1dca5b71008cef6fc25f8a788c190de887d364f1952e8abe86d73452926d35909ed60ac29bcb8f48e5c

    • SSDEEP

      768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jy:xpYoX58z1uirL98xMWnT0OQ9Jy

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks