General

  • Target

    2ae74700573b69a0896cad34304296c8a413e67b42eea8b1c9e36d599dad3b9a.exe

  • Size

    45KB

  • Sample

    241225-xft8zasrhq

  • MD5

    697d7f0ec494deb45efedf45738d0552

  • SHA1

    f89189433bcacb6937fe2217539a0860eff3ce58

  • SHA256

    2ae74700573b69a0896cad34304296c8a413e67b42eea8b1c9e36d599dad3b9a

  • SHA512

    b4af44138a7fc35d9009f64a098f70e03760f19c2a29063e7056e2c65ba3a78c4c32649a1744f6a4358f665410813bda433f2d00777a8e7a1dbc1e102174e7e7

  • SSDEEP

    768:8hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:wsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

Malware Config

Targets

    • Target

      2ae74700573b69a0896cad34304296c8a413e67b42eea8b1c9e36d599dad3b9a.exe

    • Size

      45KB

    • MD5

      697d7f0ec494deb45efedf45738d0552

    • SHA1

      f89189433bcacb6937fe2217539a0860eff3ce58

    • SHA256

      2ae74700573b69a0896cad34304296c8a413e67b42eea8b1c9e36d599dad3b9a

    • SHA512

      b4af44138a7fc35d9009f64a098f70e03760f19c2a29063e7056e2c65ba3a78c4c32649a1744f6a4358f665410813bda433f2d00777a8e7a1dbc1e102174e7e7

    • SSDEEP

      768:8hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:wsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks