General

  • Target

    6ee9dea595cbb0e6b2032b8777bf257c874cbd808cc12c7c441c6a20ccc2ce52.exe

  • Size

    34KB

  • Sample

    241211-bxyrtstnbp

  • MD5

    32827be52bd09f80744632fb8076182a

  • SHA1

    e295dc575674d5c90a7cd670973a598155976ae5

  • SHA256

    6ee9dea595cbb0e6b2032b8777bf257c874cbd808cc12c7c441c6a20ccc2ce52

  • SHA512

    15dd9da7a02ab2c1155dff07dcc9531d1ea04b55930ae860a60f9047a6f4cca05743f6b3bb739237c3a28467ace97fd12f4a9e3a29ae9f6ca8200fc2c1eb1da6

  • SSDEEP

    768:8p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JG:8pYoX58z1uirL98xMWnT0OQ9JG

Malware Config

Targets

    • Target

      6ee9dea595cbb0e6b2032b8777bf257c874cbd808cc12c7c441c6a20ccc2ce52.exe

    • Size

      34KB

    • MD5

      32827be52bd09f80744632fb8076182a

    • SHA1

      e295dc575674d5c90a7cd670973a598155976ae5

    • SHA256

      6ee9dea595cbb0e6b2032b8777bf257c874cbd808cc12c7c441c6a20ccc2ce52

    • SHA512

      15dd9da7a02ab2c1155dff07dcc9531d1ea04b55930ae860a60f9047a6f4cca05743f6b3bb739237c3a28467ace97fd12f4a9e3a29ae9f6ca8200fc2c1eb1da6

    • SSDEEP

      768:8p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JG:8pYoX58z1uirL98xMWnT0OQ9JG

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks