General

  • Target

    3706968e047c80788dcc6bb26880f097682b58c828d83370f775237c5e105a08N.exe

  • Size

    110KB

  • Sample

    241206-lbdvmszqhs

  • MD5

    24c66b50cb18926cb6cb0fb916704820

  • SHA1

    7781668a7859df08ffe26a87d8191cc46c9418b9

  • SHA256

    3706968e047c80788dcc6bb26880f097682b58c828d83370f775237c5e105a08

  • SHA512

    316d9dd04fee4a1d58568a74b947369ceb35c13d2a41a3d7179cbfcba86f96dc0311439adb50e3c48d6f65c25f51842b2cb2925e7b7da10814969045662d9a0e

  • SSDEEP

    1536:OiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:OiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      3706968e047c80788dcc6bb26880f097682b58c828d83370f775237c5e105a08N.exe

    • Size

      110KB

    • MD5

      24c66b50cb18926cb6cb0fb916704820

    • SHA1

      7781668a7859df08ffe26a87d8191cc46c9418b9

    • SHA256

      3706968e047c80788dcc6bb26880f097682b58c828d83370f775237c5e105a08

    • SHA512

      316d9dd04fee4a1d58568a74b947369ceb35c13d2a41a3d7179cbfcba86f96dc0311439adb50e3c48d6f65c25f51842b2cb2925e7b7da10814969045662d9a0e

    • SSDEEP

      1536:OiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:OiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks