General

  • Target

    8f280c936450e15f81efb812e5ac40bdbbd2ce2eb7f4f7fb2a2250e36537b4d5N.exe

  • Size

    45KB

  • Sample

    241219-by969asjcq

  • MD5

    be3093753f21b22af79bf21e14b87570

  • SHA1

    f23573c34d5ef2fffccfec42ef130dc68626e1d0

  • SHA256

    8f280c936450e15f81efb812e5ac40bdbbd2ce2eb7f4f7fb2a2250e36537b4d5

  • SHA512

    168707d9f15750f2cd7d8d87b562994a3676e3ad7065dd9148955f335bdf9b6970c73910a19cbc91f6d1eba6492af7c1c8fe6f96ffc69b42f896b55140254b34

  • SSDEEP

    768:dhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:fsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

Malware Config

Targets

    • Target

      8f280c936450e15f81efb812e5ac40bdbbd2ce2eb7f4f7fb2a2250e36537b4d5N.exe

    • Size

      45KB

    • MD5

      be3093753f21b22af79bf21e14b87570

    • SHA1

      f23573c34d5ef2fffccfec42ef130dc68626e1d0

    • SHA256

      8f280c936450e15f81efb812e5ac40bdbbd2ce2eb7f4f7fb2a2250e36537b4d5

    • SHA512

      168707d9f15750f2cd7d8d87b562994a3676e3ad7065dd9148955f335bdf9b6970c73910a19cbc91f6d1eba6492af7c1c8fe6f96ffc69b42f896b55140254b34

    • SSDEEP

      768:dhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:fsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks