General

  • Target

    d7f3b297ab13a35853b3733b5f329ba93a5a42b9e029e6a66d8aeb47b9d6c831.exe

  • Size

    45KB

  • Sample

    241219-jscykawngr

  • MD5

    fb0450d3922436804f73009d563ec84d

  • SHA1

    7ef342e65a5d6684764594972107f9a40edf8f78

  • SHA256

    d7f3b297ab13a35853b3733b5f329ba93a5a42b9e029e6a66d8aeb47b9d6c831

  • SHA512

    6f141dede378e43f118289ca7d4a91ebbcccab91fd881c441a1391c284110f5dedf0808c95415d91a92cf99093991baa9a1c06286d071be4a7f2305a5261ae36

  • SSDEEP

    768:dhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2n:fsWE9N5dFu53dsniQaB/xZ14n7zIF+qz

Malware Config

Targets

    • Target

      d7f3b297ab13a35853b3733b5f329ba93a5a42b9e029e6a66d8aeb47b9d6c831.exe

    • Size

      45KB

    • MD5

      fb0450d3922436804f73009d563ec84d

    • SHA1

      7ef342e65a5d6684764594972107f9a40edf8f78

    • SHA256

      d7f3b297ab13a35853b3733b5f329ba93a5a42b9e029e6a66d8aeb47b9d6c831

    • SHA512

      6f141dede378e43f118289ca7d4a91ebbcccab91fd881c441a1391c284110f5dedf0808c95415d91a92cf99093991baa9a1c06286d071be4a7f2305a5261ae36

    • SSDEEP

      768:dhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2n:fsWE9N5dFu53dsniQaB/xZ14n7zIF+qz

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks