General

  • Target

    318331584cc80cdc2cdeb18b7bb2cd2668ba6a60aedb60ef295b77351a4506f8N.exe

  • Size

    45KB

  • Sample

    241217-xy7l1svndv

  • MD5

    9d8767c2e2f8b3bfde57a5d193c61250

  • SHA1

    d9f9cf6bb42eaefad0302a0e83db472933fb6f17

  • SHA256

    318331584cc80cdc2cdeb18b7bb2cd2668ba6a60aedb60ef295b77351a4506f8

  • SHA512

    0e958a41b8839ed508078987337a88f91b50569ba264a660fd709f10efd3ed474fc0fc38882194ee0795e225b913ed3e0b4de4c84acf63983ad8fbd55cd53967

  • SSDEEP

    768:ghP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:csWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      318331584cc80cdc2cdeb18b7bb2cd2668ba6a60aedb60ef295b77351a4506f8N.exe

    • Size

      45KB

    • MD5

      9d8767c2e2f8b3bfde57a5d193c61250

    • SHA1

      d9f9cf6bb42eaefad0302a0e83db472933fb6f17

    • SHA256

      318331584cc80cdc2cdeb18b7bb2cd2668ba6a60aedb60ef295b77351a4506f8

    • SHA512

      0e958a41b8839ed508078987337a88f91b50569ba264a660fd709f10efd3ed474fc0fc38882194ee0795e225b913ed3e0b4de4c84acf63983ad8fbd55cd53967

    • SSDEEP

      768:ghP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:csWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks