General

  • Target

    e584fa5aa332909d78ee9c99dd15c729f446e1e0f7a8bbe4a24b97151bf7cd22N.exe

  • Size

    110KB

  • Sample

    241216-fg73sawqan

  • MD5

    1be7ad529ccb0baeb973522db6f2e5e0

  • SHA1

    e12c919f71154a44089c156cab3e645e3540c1da

  • SHA256

    e584fa5aa332909d78ee9c99dd15c729f446e1e0f7a8bbe4a24b97151bf7cd22

  • SHA512

    f001d04bef10f5765e17a87b696a2ab8d072a187c3e092279534fba15aea0e178ea60d29c4054450e864d79646cd6f95582ba275c4dd22d4f874d1f09555b70f

  • SSDEEP

    1536:yiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:yiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      e584fa5aa332909d78ee9c99dd15c729f446e1e0f7a8bbe4a24b97151bf7cd22N.exe

    • Size

      110KB

    • MD5

      1be7ad529ccb0baeb973522db6f2e5e0

    • SHA1

      e12c919f71154a44089c156cab3e645e3540c1da

    • SHA256

      e584fa5aa332909d78ee9c99dd15c729f446e1e0f7a8bbe4a24b97151bf7cd22

    • SHA512

      f001d04bef10f5765e17a87b696a2ab8d072a187c3e092279534fba15aea0e178ea60d29c4054450e864d79646cd6f95582ba275c4dd22d4f874d1f09555b70f

    • SSDEEP

      1536:yiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:yiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks