General

  • Target

    da867d96f5a1025594feabde61c915bab32611c4167641d807fbb98bd801af28.exe

  • Size

    110KB

  • Sample

    241205-y4ec4awrbk

  • MD5

    44d3999e6b7a9d75b372033a7878a4e9

  • SHA1

    1db971dadc5e0b5ead4a196219cc841050e59628

  • SHA256

    da867d96f5a1025594feabde61c915bab32611c4167641d807fbb98bd801af28

  • SHA512

    3cc2551938520a46e8edf31e9c238dee65bb2a04e09012abe1b4203d82f5de276a5d279eab1dd1136eabd64cc36ec902c718386448c26dc64599cb14c67e11f1

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:liyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      da867d96f5a1025594feabde61c915bab32611c4167641d807fbb98bd801af28.exe

    • Size

      110KB

    • MD5

      44d3999e6b7a9d75b372033a7878a4e9

    • SHA1

      1db971dadc5e0b5ead4a196219cc841050e59628

    • SHA256

      da867d96f5a1025594feabde61c915bab32611c4167641d807fbb98bd801af28

    • SHA512

      3cc2551938520a46e8edf31e9c238dee65bb2a04e09012abe1b4203d82f5de276a5d279eab1dd1136eabd64cc36ec902c718386448c26dc64599cb14c67e11f1

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:liyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks