General

  • Target

    db9c42df7caf2c04a9d3f1f7173785bb04e80a018f6189b629c81e2c6d76f849N.exe

  • Size

    45KB

  • Sample

    241216-tkdj8svkd1

  • MD5

    7d76fe653a5ef1c3d838c9c0b9b2f0d0

  • SHA1

    827f42ba952c913dda8976bdb33e6e02d84ad76f

  • SHA256

    db9c42df7caf2c04a9d3f1f7173785bb04e80a018f6189b629c81e2c6d76f849

  • SHA512

    c5e90001f2b5c4318fe94736c456984d49001e084aceb7bf0cf76dbeedb2043833bf90b4ddf381756c91f99098b0e8c198a397f28ab1c6c5bfae2ccda2ebea86

  • SSDEEP

    768:RhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:rsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      db9c42df7caf2c04a9d3f1f7173785bb04e80a018f6189b629c81e2c6d76f849N.exe

    • Size

      45KB

    • MD5

      7d76fe653a5ef1c3d838c9c0b9b2f0d0

    • SHA1

      827f42ba952c913dda8976bdb33e6e02d84ad76f

    • SHA256

      db9c42df7caf2c04a9d3f1f7173785bb04e80a018f6189b629c81e2c6d76f849

    • SHA512

      c5e90001f2b5c4318fe94736c456984d49001e084aceb7bf0cf76dbeedb2043833bf90b4ddf381756c91f99098b0e8c198a397f28ab1c6c5bfae2ccda2ebea86

    • SSDEEP

      768:RhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:rsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks