General

  • Target

    44e9255cd30ca9b2a6d72978fc124b9c6d44cea4eb3016bbfc1845ea808db2bbN.exe

  • Size

    110KB

  • Sample

    241205-nv2f6ayphn

  • MD5

    d80afce384e2dcda5c05aaa76d7482a0

  • SHA1

    96c36a0e91a4075a39c9661fc64c468f17f1aa97

  • SHA256

    44e9255cd30ca9b2a6d72978fc124b9c6d44cea4eb3016bbfc1845ea808db2bb

  • SHA512

    c4ab25ded2e987cc690dda7e6df0d5925eec1ceeed56707f850f826e1eafabfff2e35a62116b4040954fb80f03bc2c86b1d3d3f51cec7390df42dc1d90064dd7

  • SSDEEP

    1536:hiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:hiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      44e9255cd30ca9b2a6d72978fc124b9c6d44cea4eb3016bbfc1845ea808db2bbN.exe

    • Size

      110KB

    • MD5

      d80afce384e2dcda5c05aaa76d7482a0

    • SHA1

      96c36a0e91a4075a39c9661fc64c468f17f1aa97

    • SHA256

      44e9255cd30ca9b2a6d72978fc124b9c6d44cea4eb3016bbfc1845ea808db2bb

    • SHA512

      c4ab25ded2e987cc690dda7e6df0d5925eec1ceeed56707f850f826e1eafabfff2e35a62116b4040954fb80f03bc2c86b1d3d3f51cec7390df42dc1d90064dd7

    • SSDEEP

      1536:hiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:hiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks