General

  • Target

    bf6fcf3bce8de45d65594c44b85be0c3e1d2c22ff707bfbecac09cbdf5134527N.exe

  • Size

    45KB

  • Sample

    241211-arm8ga1nep

  • MD5

    6a870e96533830f962fe6bb72f78a9d0

  • SHA1

    14aa4641f4869e775f8dd88efa596effaa389bc8

  • SHA256

    bf6fcf3bce8de45d65594c44b85be0c3e1d2c22ff707bfbecac09cbdf5134527

  • SHA512

    224a3c092333456d668cad04190047d3ae3c274f05890c06d01c8c2c95a74fb52e040a326a51bc4f95461e551271bf8e12448649dc1fbde27da1f77823552477

  • SSDEEP

    768:ThP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2H:FsWE9N5dFu53dsniQaB/xZ14n7zIF+qT

Malware Config

Targets

    • Target

      bf6fcf3bce8de45d65594c44b85be0c3e1d2c22ff707bfbecac09cbdf5134527N.exe

    • Size

      45KB

    • MD5

      6a870e96533830f962fe6bb72f78a9d0

    • SHA1

      14aa4641f4869e775f8dd88efa596effaa389bc8

    • SHA256

      bf6fcf3bce8de45d65594c44b85be0c3e1d2c22ff707bfbecac09cbdf5134527

    • SHA512

      224a3c092333456d668cad04190047d3ae3c274f05890c06d01c8c2c95a74fb52e040a326a51bc4f95461e551271bf8e12448649dc1fbde27da1f77823552477

    • SSDEEP

      768:ThP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2H:FsWE9N5dFu53dsniQaB/xZ14n7zIF+qT

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks