General

  • Target

    a2d94770802f4e8293ecc6f6bc448acaff2ac5283b076cee89be5cb8fa9dfa7cN.exe

  • Size

    45KB

  • Sample

    241216-v8n7bawpft

  • MD5

    8e1fc230fd761fa174ffb860ee3ae470

  • SHA1

    16eb23716841bac187c8e7126510597e9f1cedb6

  • SHA256

    a2d94770802f4e8293ecc6f6bc448acaff2ac5283b076cee89be5cb8fa9dfa7c

  • SHA512

    b4bdb56166292c03fd57dc8b248fe905eae917aafbf2245393bd2d43722d9d3ae613630f6c2c5d46cec0d235adfb14f69334facbfb5643da9b4055fe1f215405

  • SSDEEP

    768:+hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:SsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      a2d94770802f4e8293ecc6f6bc448acaff2ac5283b076cee89be5cb8fa9dfa7cN.exe

    • Size

      45KB

    • MD5

      8e1fc230fd761fa174ffb860ee3ae470

    • SHA1

      16eb23716841bac187c8e7126510597e9f1cedb6

    • SHA256

      a2d94770802f4e8293ecc6f6bc448acaff2ac5283b076cee89be5cb8fa9dfa7c

    • SHA512

      b4bdb56166292c03fd57dc8b248fe905eae917aafbf2245393bd2d43722d9d3ae613630f6c2c5d46cec0d235adfb14f69334facbfb5643da9b4055fe1f215405

    • SSDEEP

      768:+hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:SsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks