General

  • Target

    c798d5be40c2bd7b5568ef581ee970a14532d677c2ec6ae8d43bd6902efec66bN.exe

  • Size

    45KB

  • Sample

    241216-rp93wssmhy

  • MD5

    f986fa3b904da920542c58f69cb95250

  • SHA1

    c71481cf575a22edcc84051664399c21c45ff326

  • SHA256

    c798d5be40c2bd7b5568ef581ee970a14532d677c2ec6ae8d43bd6902efec66b

  • SHA512

    cfaf67c3c466a8cd05f3d3ce7fa355ca4eeee2d2e921d7200192e881e8e7bd8baa906976f5a2e6d4100e110eae4e37b2b39a104d3dd11cf87faf924c55e591c3

  • SSDEEP

    768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:BsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

Malware Config

Targets

    • Target

      c798d5be40c2bd7b5568ef581ee970a14532d677c2ec6ae8d43bd6902efec66bN.exe

    • Size

      45KB

    • MD5

      f986fa3b904da920542c58f69cb95250

    • SHA1

      c71481cf575a22edcc84051664399c21c45ff326

    • SHA256

      c798d5be40c2bd7b5568ef581ee970a14532d677c2ec6ae8d43bd6902efec66b

    • SHA512

      cfaf67c3c466a8cd05f3d3ce7fa355ca4eeee2d2e921d7200192e881e8e7bd8baa906976f5a2e6d4100e110eae4e37b2b39a104d3dd11cf87faf924c55e591c3

    • SSDEEP

      768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:BsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks