General

  • Target

    85d493698d0e055bc24a30270d53bd78223a1227e4a82c5a5e31170ae3d29fed.exe

  • Size

    45KB

  • Sample

    241217-3lbayaspay

  • MD5

    0982dc2ab7dc8b9ddbbf5bfa6921c39c

  • SHA1

    f3b23bb107826574c414341f0feb838a33f73c61

  • SHA256

    85d493698d0e055bc24a30270d53bd78223a1227e4a82c5a5e31170ae3d29fed

  • SHA512

    7122472299f6578a7c11500c41d15adf77c8ebfa64a9fa47950467f8fc80f04bb4d646cced69d943c91a5db8e0d937cf7a8c57c4c0e7f6444adf6b96a83fd7ef

  • SSDEEP

    768:ghP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:csWE9N5dFu53dsniQaB/xZ14n7zIF+qB

Malware Config

Targets

    • Target

      85d493698d0e055bc24a30270d53bd78223a1227e4a82c5a5e31170ae3d29fed.exe

    • Size

      45KB

    • MD5

      0982dc2ab7dc8b9ddbbf5bfa6921c39c

    • SHA1

      f3b23bb107826574c414341f0feb838a33f73c61

    • SHA256

      85d493698d0e055bc24a30270d53bd78223a1227e4a82c5a5e31170ae3d29fed

    • SHA512

      7122472299f6578a7c11500c41d15adf77c8ebfa64a9fa47950467f8fc80f04bb4d646cced69d943c91a5db8e0d937cf7a8c57c4c0e7f6444adf6b96a83fd7ef

    • SSDEEP

      768:ghP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:csWE9N5dFu53dsniQaB/xZ14n7zIF+qB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks