General

  • Target

    c5c46a750bb5e690030ffd47ba640a771493498736e731bcbe0eb0a6d646edbcN.exe

  • Size

    110KB

  • Sample

    241220-gcsyqssjbn

  • MD5

    12c1d61d3262d1d606c5c023958b93c0

  • SHA1

    efac208c95a66d13e17a6d66576dd9ffdc6813d2

  • SHA256

    c5c46a750bb5e690030ffd47ba640a771493498736e731bcbe0eb0a6d646edbc

  • SHA512

    00fe41167b11c37f2191a755f5ef72e06fccdde8494f3e63b991e588358b1572fcd8767a5df9dd2e4e39e35829420a62a2977423efb0a98304bd705f1a9ec332

  • SSDEEP

    1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:YiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      c5c46a750bb5e690030ffd47ba640a771493498736e731bcbe0eb0a6d646edbcN.exe

    • Size

      110KB

    • MD5

      12c1d61d3262d1d606c5c023958b93c0

    • SHA1

      efac208c95a66d13e17a6d66576dd9ffdc6813d2

    • SHA256

      c5c46a750bb5e690030ffd47ba640a771493498736e731bcbe0eb0a6d646edbc

    • SHA512

      00fe41167b11c37f2191a755f5ef72e06fccdde8494f3e63b991e588358b1572fcd8767a5df9dd2e4e39e35829420a62a2977423efb0a98304bd705f1a9ec332

    • SSDEEP

      1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:YiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks