General

  • Target

    d81adc6ca442b7ffca27a036e5617dae5fa3cab95e46178e8528c49a26fb22ebN.exe

  • Size

    34KB

  • Sample

    241219-1yf1va1qbn

  • MD5

    9e8a9404c633b1d232d4259261798130

  • SHA1

    7e2efb644572c8911b0e53bf64e62fb16f9df591

  • SHA256

    d81adc6ca442b7ffca27a036e5617dae5fa3cab95e46178e8528c49a26fb22eb

  • SHA512

    139fd97abc1e3251f9bb612123350afb08824c72fb9b90b88f06f6420dd3a71dba1311bef3d1a3122a7126edf930f9b33a36f8bcd4c805e13cee043dc2b1b698

  • SSDEEP

    768:Fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JC:FpYoX58z1uirL98xMWnT0OQ9JC

Malware Config

Targets

    • Target

      d81adc6ca442b7ffca27a036e5617dae5fa3cab95e46178e8528c49a26fb22ebN.exe

    • Size

      34KB

    • MD5

      9e8a9404c633b1d232d4259261798130

    • SHA1

      7e2efb644572c8911b0e53bf64e62fb16f9df591

    • SHA256

      d81adc6ca442b7ffca27a036e5617dae5fa3cab95e46178e8528c49a26fb22eb

    • SHA512

      139fd97abc1e3251f9bb612123350afb08824c72fb9b90b88f06f6420dd3a71dba1311bef3d1a3122a7126edf930f9b33a36f8bcd4c805e13cee043dc2b1b698

    • SSDEEP

      768:Fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JC:FpYoX58z1uirL98xMWnT0OQ9JC

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks