General

  • Target

    de216e5ced492f4a68b4dce68d3e2e54ed43acdb6924437862bb739b72a564daN.exe

  • Size

    110KB

  • Sample

    241206-f6b2msslh1

  • MD5

    32cacd82117d1d62a156b7b2fa0c4410

  • SHA1

    cbf6f997b6948b11dd11d8f6abb14c55d448cc08

  • SHA256

    de216e5ced492f4a68b4dce68d3e2e54ed43acdb6924437862bb739b72a564da

  • SHA512

    e6e0ba79bfbbd47c62f78bcd538d258acc5fa45e6c71a4dae42771eeaae67c0ccebf4f13b434d702a3ac0b80665c1d8406c28c6497cf50f443f580f509a403f5

  • SSDEEP

    1536:tiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:tiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      de216e5ced492f4a68b4dce68d3e2e54ed43acdb6924437862bb739b72a564daN.exe

    • Size

      110KB

    • MD5

      32cacd82117d1d62a156b7b2fa0c4410

    • SHA1

      cbf6f997b6948b11dd11d8f6abb14c55d448cc08

    • SHA256

      de216e5ced492f4a68b4dce68d3e2e54ed43acdb6924437862bb739b72a564da

    • SHA512

      e6e0ba79bfbbd47c62f78bcd538d258acc5fa45e6c71a4dae42771eeaae67c0ccebf4f13b434d702a3ac0b80665c1d8406c28c6497cf50f443f580f509a403f5

    • SSDEEP

      1536:tiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:tiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks