General

  • Target

    fea834d3d1cdf59bd4ac9d91477f0ebac35f3a74e45e694d1bf9585ac425e73c.exe

  • Size

    45KB

  • Sample

    241206-ls75taxlfp

  • MD5

    5f382a72007a57a8a7bd8295b38fc35f

  • SHA1

    029cbb0206174cd67fffb4705b7437478b9e550e

  • SHA256

    fea834d3d1cdf59bd4ac9d91477f0ebac35f3a74e45e694d1bf9585ac425e73c

  • SHA512

    e8df5117076f63d810d952341f3bb4171e92afab22cf70645ddd962cca4abcace0b34a8cefb64c6f7185680d5ea78484330b7e5f81fac4d1ac12cc30e5644686

  • SSDEEP

    768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:ksWE9N5dFu53dsniQaB/xZ14n7zIF+q5

Malware Config

Targets

    • Target

      fea834d3d1cdf59bd4ac9d91477f0ebac35f3a74e45e694d1bf9585ac425e73c.exe

    • Size

      45KB

    • MD5

      5f382a72007a57a8a7bd8295b38fc35f

    • SHA1

      029cbb0206174cd67fffb4705b7437478b9e550e

    • SHA256

      fea834d3d1cdf59bd4ac9d91477f0ebac35f3a74e45e694d1bf9585ac425e73c

    • SHA512

      e8df5117076f63d810d952341f3bb4171e92afab22cf70645ddd962cca4abcace0b34a8cefb64c6f7185680d5ea78484330b7e5f81fac4d1ac12cc30e5644686

    • SSDEEP

      768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:ksWE9N5dFu53dsniQaB/xZ14n7zIF+q5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks