General

  • Target

    c42f49550b768d4ea206b87155f516fdd0690b889fb63fee2ea3772adbdffb18.exe

  • Size

    160KB

  • Sample

    241207-m3c8vszlbt

  • MD5

    0616f8e3baf073dd7859914536344049

  • SHA1

    86826339a495c12c267761f4991eae5ae946fa61

  • SHA256

    c42f49550b768d4ea206b87155f516fdd0690b889fb63fee2ea3772adbdffb18

  • SHA512

    e10c2fd3633b97ab0e928c87f9a4be773f168bf79f09e9fc53f17e3720ab98cf305ce7981ecba6e493c55df87692a6b32d800db4a38fcf92eab240b5df5f442f

  • SSDEEP

    1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:TY+4MiIkLZJNAQ9J6v+

Malware Config

Targets

    • Target

      c42f49550b768d4ea206b87155f516fdd0690b889fb63fee2ea3772adbdffb18.exe

    • Size

      160KB

    • MD5

      0616f8e3baf073dd7859914536344049

    • SHA1

      86826339a495c12c267761f4991eae5ae946fa61

    • SHA256

      c42f49550b768d4ea206b87155f516fdd0690b889fb63fee2ea3772adbdffb18

    • SHA512

      e10c2fd3633b97ab0e928c87f9a4be773f168bf79f09e9fc53f17e3720ab98cf305ce7981ecba6e493c55df87692a6b32d800db4a38fcf92eab240b5df5f442f

    • SSDEEP

      1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:TY+4MiIkLZJNAQ9J6v+

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks