General

  • Target

    3d2f7206c17d8d9e0433c5b08a179c1f5df2b8b141c126a0be0b63fa75d06252.exe

  • Size

    110KB

  • Sample

    241225-xx8gxstpep

  • MD5

    a13e1cd80101c6ae83ad471709bd7fc7

  • SHA1

    5b60051c703b5776c12091e36aba6613c8b0ebbe

  • SHA256

    3d2f7206c17d8d9e0433c5b08a179c1f5df2b8b141c126a0be0b63fa75d06252

  • SHA512

    d9c67f3a1fe9e8c6cea023bd1fdeb6898bcebcf6c779f5885ab844b2f96affc89f1c1682658a14c808e93a26313f53d675557c9a959076a55134b47a284e36c8

  • SSDEEP

    1536:siLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:siyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      3d2f7206c17d8d9e0433c5b08a179c1f5df2b8b141c126a0be0b63fa75d06252.exe

    • Size

      110KB

    • MD5

      a13e1cd80101c6ae83ad471709bd7fc7

    • SHA1

      5b60051c703b5776c12091e36aba6613c8b0ebbe

    • SHA256

      3d2f7206c17d8d9e0433c5b08a179c1f5df2b8b141c126a0be0b63fa75d06252

    • SHA512

      d9c67f3a1fe9e8c6cea023bd1fdeb6898bcebcf6c779f5885ab844b2f96affc89f1c1682658a14c808e93a26313f53d675557c9a959076a55134b47a284e36c8

    • SSDEEP

      1536:siLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:siyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks