General

  • Target

    4e8a548120334ee5f80a5675b897fdeb86103cdb0f1f1b76f125522988f70707N.exe

  • Size

    34KB

  • Sample

    241207-fk53latjaq

  • MD5

    d2c8020a6a0c11a0cdf9219b91010a50

  • SHA1

    1fe109cf1e128111537f745e8ec2ce53313e356f

  • SHA256

    4e8a548120334ee5f80a5675b897fdeb86103cdb0f1f1b76f125522988f70707

  • SHA512

    9806766528b87771da74a31a50f0f757e7e4c400e4144c508809beae4d87ec3b03b91e17a803f12404182ba1916c7656c0e58b7b80ac44d4d8d5be76b4c0c319

  • SSDEEP

    768:ip22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jy:ipYoX58z1uirL98xMWnT0OQ9Jy

Malware Config

Targets

    • Target

      4e8a548120334ee5f80a5675b897fdeb86103cdb0f1f1b76f125522988f70707N.exe

    • Size

      34KB

    • MD5

      d2c8020a6a0c11a0cdf9219b91010a50

    • SHA1

      1fe109cf1e128111537f745e8ec2ce53313e356f

    • SHA256

      4e8a548120334ee5f80a5675b897fdeb86103cdb0f1f1b76f125522988f70707

    • SHA512

      9806766528b87771da74a31a50f0f757e7e4c400e4144c508809beae4d87ec3b03b91e17a803f12404182ba1916c7656c0e58b7b80ac44d4d8d5be76b4c0c319

    • SSDEEP

      768:ip22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Jy:ipYoX58z1uirL98xMWnT0OQ9Jy

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks