General

  • Target

    b202ff8200c54be7f8a1397ac0a69dcf392fd24b2bb3acef40eedb2af559bcbdN.exe

  • Size

    89KB

  • Sample

    241205-sley1swkgr

  • MD5

    f1c14428fead26e9567af94f3a3a74b0

  • SHA1

    c9ae36f27d57dec3951623d8c96cf3768410a4d7

  • SHA256

    b202ff8200c54be7f8a1397ac0a69dcf392fd24b2bb3acef40eedb2af559bcbd

  • SHA512

    827740e64b01e5cb98f228efbade87047d0efc5252099e423f9425bb19490b78d1db1f23bdf5a2d494035fa9b1e3bdaf7f4d401c662426abf7db7d614d87ea29

  • SSDEEP

    1536:s1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7O:Y+4MJIkLZJNAQ9Jo9O

Malware Config

Targets

    • Target

      b202ff8200c54be7f8a1397ac0a69dcf392fd24b2bb3acef40eedb2af559bcbdN.exe

    • Size

      89KB

    • MD5

      f1c14428fead26e9567af94f3a3a74b0

    • SHA1

      c9ae36f27d57dec3951623d8c96cf3768410a4d7

    • SHA256

      b202ff8200c54be7f8a1397ac0a69dcf392fd24b2bb3acef40eedb2af559bcbd

    • SHA512

      827740e64b01e5cb98f228efbade87047d0efc5252099e423f9425bb19490b78d1db1f23bdf5a2d494035fa9b1e3bdaf7f4d401c662426abf7db7d614d87ea29

    • SSDEEP

      1536:s1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7O:Y+4MJIkLZJNAQ9Jo9O

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks