General

  • Target

    376616b91767bc8b6416c281e36b89e801bd46911d0f6779f3533cce21430ac3N.exe

  • Size

    34KB

  • Sample

    241217-l3crnaxpaj

  • MD5

    70eb90926a331e62ccb5b2adc9f30870

  • SHA1

    296e2dd5375e6145b80a5bfcd3703aa8e348a3b7

  • SHA256

    376616b91767bc8b6416c281e36b89e801bd46911d0f6779f3533cce21430ac3

  • SHA512

    5bc707c0c2bd56047e421f3999c7ab4d17f12170c9051eb4646d8220c8e2064ba263a9d42d1e7bb6a6a2d64e451aaae71992994488ba1ed8ce8734136aa5b778

  • SSDEEP

    768:Fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:FpYoX58z1uirL98xMWnT0OQ9Ji

Malware Config

Targets

    • Target

      376616b91767bc8b6416c281e36b89e801bd46911d0f6779f3533cce21430ac3N.exe

    • Size

      34KB

    • MD5

      70eb90926a331e62ccb5b2adc9f30870

    • SHA1

      296e2dd5375e6145b80a5bfcd3703aa8e348a3b7

    • SHA256

      376616b91767bc8b6416c281e36b89e801bd46911d0f6779f3533cce21430ac3

    • SHA512

      5bc707c0c2bd56047e421f3999c7ab4d17f12170c9051eb4646d8220c8e2064ba263a9d42d1e7bb6a6a2d64e451aaae71992994488ba1ed8ce8734136aa5b778

    • SSDEEP

      768:Fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:FpYoX58z1uirL98xMWnT0OQ9Ji

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks