General

  • Target

    bbf97444486ba3516bac11f4f6928c8b046b78f655e6e7e32105360569e56c9a.exe

  • Size

    45KB

  • Sample

    241211-dcpdrsspfw

  • MD5

    8366fefac944cb8af13a86013980c678

  • SHA1

    665fa7d64ca92bc377d8ad81ee60dd0af4393545

  • SHA256

    bbf97444486ba3516bac11f4f6928c8b046b78f655e6e7e32105360569e56c9a

  • SHA512

    7aaa9650cec52ed365f45839b015ab1e5b6549495f823429270c7bc21c38c7b4d1558f9c61265cd44e4d138ab47e0b2d8888b6de88f4c88ca020b9ba8d53709f

  • SSDEEP

    768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      bbf97444486ba3516bac11f4f6928c8b046b78f655e6e7e32105360569e56c9a.exe

    • Size

      45KB

    • MD5

      8366fefac944cb8af13a86013980c678

    • SHA1

      665fa7d64ca92bc377d8ad81ee60dd0af4393545

    • SHA256

      bbf97444486ba3516bac11f4f6928c8b046b78f655e6e7e32105360569e56c9a

    • SHA512

      7aaa9650cec52ed365f45839b015ab1e5b6549495f823429270c7bc21c38c7b4d1558f9c61265cd44e4d138ab47e0b2d8888b6de88f4c88ca020b9ba8d53709f

    • SSDEEP

      768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks