General

  • Target

    e4a2af62d511687167ad5f264a0035ebee5a694363112ef530c344591261eea7.exe

  • Size

    89KB

  • Sample

    241225-vph6yszndm

  • MD5

    0b91932f16c8ded96503b52f8e71e6d7

  • SHA1

    024c8465e4c2eee355eaa26436412acdc3c650b4

  • SHA256

    e4a2af62d511687167ad5f264a0035ebee5a694363112ef530c344591261eea7

  • SHA512

    df466382b36085be5f7f441e83592df860b60b37066710f4e21b0a60bc0fdd8c58fc4ec5fc3f33e9c8e7490a00356907512d7be2676aff96ae160da61484f6e9

  • SSDEEP

    1536:t1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:v+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      e4a2af62d511687167ad5f264a0035ebee5a694363112ef530c344591261eea7.exe

    • Size

      89KB

    • MD5

      0b91932f16c8ded96503b52f8e71e6d7

    • SHA1

      024c8465e4c2eee355eaa26436412acdc3c650b4

    • SHA256

      e4a2af62d511687167ad5f264a0035ebee5a694363112ef530c344591261eea7

    • SHA512

      df466382b36085be5f7f441e83592df860b60b37066710f4e21b0a60bc0fdd8c58fc4ec5fc3f33e9c8e7490a00356907512d7be2676aff96ae160da61484f6e9

    • SSDEEP

      1536:t1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:v+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks