General

  • Target

    93908e28fd00887ef6df4692c8f186da669816a5388dc076e0d3af5ed9e90766N.exe

  • Size

    89KB

  • Sample

    241206-kl88vsypht

  • MD5

    962f1fd13b28a0c6f334696148759350

  • SHA1

    f6a17ac6a88ae3339f1509e422ea5f5d18909469

  • SHA256

    93908e28fd00887ef6df4692c8f186da669816a5388dc076e0d3af5ed9e90766

  • SHA512

    48c4f52e028c3a0be8a9033e0ada92fd76446faa73daa26b363901f8295866ef3f4e905474a011b4b1b50636af7ea7bbe7d85a248725301c1ef8f07730740d83

  • SSDEEP

    1536:p1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:j+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      93908e28fd00887ef6df4692c8f186da669816a5388dc076e0d3af5ed9e90766N.exe

    • Size

      89KB

    • MD5

      962f1fd13b28a0c6f334696148759350

    • SHA1

      f6a17ac6a88ae3339f1509e422ea5f5d18909469

    • SHA256

      93908e28fd00887ef6df4692c8f186da669816a5388dc076e0d3af5ed9e90766

    • SHA512

      48c4f52e028c3a0be8a9033e0ada92fd76446faa73daa26b363901f8295866ef3f4e905474a011b4b1b50636af7ea7bbe7d85a248725301c1ef8f07730740d83

    • SSDEEP

      1536:p1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:j+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks