General

  • Target

    4a306d1a6f960a1ba00d257bdee45f53eb69b37d78c6c1efb945001f814821e2.exe

  • Size

    34KB

  • Sample

    241205-yyjevszmcv

  • MD5

    6bd6d168d6ec32aab21dc75cbafcbb58

  • SHA1

    ae4b77a65f2b563d2dd72fa6763d412f3d78a867

  • SHA256

    4a306d1a6f960a1ba00d257bdee45f53eb69b37d78c6c1efb945001f814821e2

  • SHA512

    aeb736aea0246a81a6d598a258b51ab99de4bbb42fd14d7334b088fc31f91990ae3ec9af35a7f74975084623764fc6e37cd7bd320467022be52dd2356a7a12f7

  • SSDEEP

    768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:xpYoX58z1uirL98xMWnT0OQ9Ji

Malware Config

Targets

    • Target

      4a306d1a6f960a1ba00d257bdee45f53eb69b37d78c6c1efb945001f814821e2.exe

    • Size

      34KB

    • MD5

      6bd6d168d6ec32aab21dc75cbafcbb58

    • SHA1

      ae4b77a65f2b563d2dd72fa6763d412f3d78a867

    • SHA256

      4a306d1a6f960a1ba00d257bdee45f53eb69b37d78c6c1efb945001f814821e2

    • SHA512

      aeb736aea0246a81a6d598a258b51ab99de4bbb42fd14d7334b088fc31f91990ae3ec9af35a7f74975084623764fc6e37cd7bd320467022be52dd2356a7a12f7

    • SSDEEP

      768:xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:xpYoX58z1uirL98xMWnT0OQ9Ji

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks