General

  • Target

    83527c050e70b779159b564fbf81d98fc9c3cbf73a39bb334ad4b9a89fe24b3cN.exe

  • Size

    45KB

  • Sample

    241205-spkcxawmcr

  • MD5

    0dd285a07294418cdebf5cb3850fcac0

  • SHA1

    2f39a6b817d8941241cf03371e7be7af2a5f70ec

  • SHA256

    83527c050e70b779159b564fbf81d98fc9c3cbf73a39bb334ad4b9a89fe24b3c

  • SHA512

    006ba8a50af3b2bb25717689f9034a621d828ad3ebdb5050b9b8324b7e3f16b16f7423b492c10cf2379eb72805880882f9105409521edfca633ff450f9b16e7b

  • SSDEEP

    768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2H:ksWE9N5dFu53dsniQaB/xZ14n7zIF+qT

Malware Config

Targets

    • Target

      83527c050e70b779159b564fbf81d98fc9c3cbf73a39bb334ad4b9a89fe24b3cN.exe

    • Size

      45KB

    • MD5

      0dd285a07294418cdebf5cb3850fcac0

    • SHA1

      2f39a6b817d8941241cf03371e7be7af2a5f70ec

    • SHA256

      83527c050e70b779159b564fbf81d98fc9c3cbf73a39bb334ad4b9a89fe24b3c

    • SHA512

      006ba8a50af3b2bb25717689f9034a621d828ad3ebdb5050b9b8324b7e3f16b16f7423b492c10cf2379eb72805880882f9105409521edfca633ff450f9b16e7b

    • SSDEEP

      768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2H:ksWE9N5dFu53dsniQaB/xZ14n7zIF+qT

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks