General

  • Target

    10ffe3c0626bafc4c55c2418d0642b06ada975951e02dddef8c0a4e4bf7057ef.exe

  • Size

    89KB

  • Sample

    241211-bepffaxqes

  • MD5

    9ffe67ea7a76d35ae39f8d561809cee8

  • SHA1

    62f830daadd2bdb9a3c6aa6917465e4c889aceeb

  • SHA256

    10ffe3c0626bafc4c55c2418d0642b06ada975951e02dddef8c0a4e4bf7057ef

  • SHA512

    38a27dd6983da977ffe5c75a3ce880fbd95312f25975e2ae71838d8c8ee4201fef4f66db4eb68ddf3c6076f51d7f341f0a3b0d354fb92dd8dc12d5d4d435d234

  • SSDEEP

    1536:21+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:G+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      10ffe3c0626bafc4c55c2418d0642b06ada975951e02dddef8c0a4e4bf7057ef.exe

    • Size

      89KB

    • MD5

      9ffe67ea7a76d35ae39f8d561809cee8

    • SHA1

      62f830daadd2bdb9a3c6aa6917465e4c889aceeb

    • SHA256

      10ffe3c0626bafc4c55c2418d0642b06ada975951e02dddef8c0a4e4bf7057ef

    • SHA512

      38a27dd6983da977ffe5c75a3ce880fbd95312f25975e2ae71838d8c8ee4201fef4f66db4eb68ddf3c6076f51d7f341f0a3b0d354fb92dd8dc12d5d4d435d234

    • SSDEEP

      1536:21+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:G+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks