General

  • Target

    4775c82ff7ad36ca2d1608b0ce3a6b81eec502b7515e9eb2f50c09678c253459.exe

  • Size

    89KB

  • Sample

    241205-xvbeeaxnfs

  • MD5

    90bdfee1dc856db64249858310df8e63

  • SHA1

    2ad45783ccba852974980dc995bd0b7871338190

  • SHA256

    4775c82ff7ad36ca2d1608b0ce3a6b81eec502b7515e9eb2f50c09678c253459

  • SHA512

    5a658a55dd5ab6206e2b3d7434d1b86ccf7b91d8fafeb85bb4c9c7d8aca499f5023c4a2c371c7bdb5fe419772f355dad55751bfa92a4feb4dc0f4b0578c8a5c2

  • SSDEEP

    1536:k1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:g+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      4775c82ff7ad36ca2d1608b0ce3a6b81eec502b7515e9eb2f50c09678c253459.exe

    • Size

      89KB

    • MD5

      90bdfee1dc856db64249858310df8e63

    • SHA1

      2ad45783ccba852974980dc995bd0b7871338190

    • SHA256

      4775c82ff7ad36ca2d1608b0ce3a6b81eec502b7515e9eb2f50c09678c253459

    • SHA512

      5a658a55dd5ab6206e2b3d7434d1b86ccf7b91d8fafeb85bb4c9c7d8aca499f5023c4a2c371c7bdb5fe419772f355dad55751bfa92a4feb4dc0f4b0578c8a5c2

    • SSDEEP

      1536:k1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:g+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks