General

  • Target

    8de3868b96c958ea874d30c8458dbf91695bdc905d83cffd0dd7ac54dce8fb1f.exe

  • Size

    45KB

  • Sample

    241210-hwqhdssqfj

  • MD5

    450dcc9e5fb7494342e0c61bde2d4ff1

  • SHA1

    2445d09612ab5325263bcb4b41534acf0539d026

  • SHA256

    8de3868b96c958ea874d30c8458dbf91695bdc905d83cffd0dd7ac54dce8fb1f

  • SHA512

    e7808216b5f8f65b1cb5f538aeadfd606d1b87e2ed4e34d8518d3c042f3ac791554aa17e6d3fdb72ded0dbdbbdc3c355791f8c6d9335fb986cad4e207832cfe9

  • SSDEEP

    768:9hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2F:/sWE9N5dFu53dsniQaB/xZ14n7zIF+qJ

Malware Config

Targets

    • Target

      8de3868b96c958ea874d30c8458dbf91695bdc905d83cffd0dd7ac54dce8fb1f.exe

    • Size

      45KB

    • MD5

      450dcc9e5fb7494342e0c61bde2d4ff1

    • SHA1

      2445d09612ab5325263bcb4b41534acf0539d026

    • SHA256

      8de3868b96c958ea874d30c8458dbf91695bdc905d83cffd0dd7ac54dce8fb1f

    • SHA512

      e7808216b5f8f65b1cb5f538aeadfd606d1b87e2ed4e34d8518d3c042f3ac791554aa17e6d3fdb72ded0dbdbbdc3c355791f8c6d9335fb986cad4e207832cfe9

    • SSDEEP

      768:9hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2F:/sWE9N5dFu53dsniQaB/xZ14n7zIF+qJ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks