General

  • Target

    f6daf0d5abb65bcd24dcf415410e2797c293eb1ac5eb07e02510399e72573a95.exe

  • Size

    89KB

  • Sample

    241206-pa4w8asmgm

  • MD5

    ae129f1ac36c860343804600b6808d87

  • SHA1

    309cc121b6fe107f5638f15a74acf68eab77b39d

  • SHA256

    f6daf0d5abb65bcd24dcf415410e2797c293eb1ac5eb07e02510399e72573a95

  • SHA512

    3ae529cfa7aabcdfdc84c01cd8b0380c9968470a6d9ed8730bcd57edc02a9c63417dbb5896678b03baabe75f8a1b2054e126f059e9097fe4d093df2f9d4ca758

  • SSDEEP

    1536:s1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox76:Y+4MJIkLZJNAQ9Jo96

Malware Config

Targets

    • Target

      f6daf0d5abb65bcd24dcf415410e2797c293eb1ac5eb07e02510399e72573a95.exe

    • Size

      89KB

    • MD5

      ae129f1ac36c860343804600b6808d87

    • SHA1

      309cc121b6fe107f5638f15a74acf68eab77b39d

    • SHA256

      f6daf0d5abb65bcd24dcf415410e2797c293eb1ac5eb07e02510399e72573a95

    • SHA512

      3ae529cfa7aabcdfdc84c01cd8b0380c9968470a6d9ed8730bcd57edc02a9c63417dbb5896678b03baabe75f8a1b2054e126f059e9097fe4d093df2f9d4ca758

    • SSDEEP

      1536:s1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox76:Y+4MJIkLZJNAQ9Jo96

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks