General

  • Target

    76711789167590316f17af8cd329dff9edba02902de77df555cdd116cef125dbN.exe

  • Size

    110KB

  • Sample

    241220-axe42svnfn

  • MD5

    54cf695f42ca9fd92d7086beb13cd620

  • SHA1

    de29413bd3abe30018cfd0739d95dc236a00e1d5

  • SHA256

    76711789167590316f17af8cd329dff9edba02902de77df555cdd116cef125db

  • SHA512

    80930a129e742553ddee00b127e46280fa23f0bd4925c2e9cb09d5fa074c0cbc644dd3b1473d8d8ded6d77a4b41252c3aa4885ac7f44806b1012af85f6127cfd

  • SSDEEP

    1536:/iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:/iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      76711789167590316f17af8cd329dff9edba02902de77df555cdd116cef125dbN.exe

    • Size

      110KB

    • MD5

      54cf695f42ca9fd92d7086beb13cd620

    • SHA1

      de29413bd3abe30018cfd0739d95dc236a00e1d5

    • SHA256

      76711789167590316f17af8cd329dff9edba02902de77df555cdd116cef125db

    • SHA512

      80930a129e742553ddee00b127e46280fa23f0bd4925c2e9cb09d5fa074c0cbc644dd3b1473d8d8ded6d77a4b41252c3aa4885ac7f44806b1012af85f6127cfd

    • SSDEEP

      1536:/iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:/iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks