General

  • Target

    fc8ca2f15599f48e7ce602cb36de02386f96e3af2b5cc601d119c694ef13bf1b.exe

  • Size

    45KB

  • Sample

    241226-k3h31a1pew

  • MD5

    39361e38e44693d047459ffbc751ac4c

  • SHA1

    e1f3d0e37d6cc506ff5aa13f1656a92f3599500b

  • SHA256

    fc8ca2f15599f48e7ce602cb36de02386f96e3af2b5cc601d119c694ef13bf1b

  • SHA512

    bbb3d3f04d80c63a6278426569ea9bf6e89864f1d4f0868ac1c65ff2083f4438358f16fe4f8a0cf26dc0e261fb3fa528fad645c80324dad81b056cb6c08ee94b

  • SSDEEP

    768:ohP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:UsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

Malware Config

Targets

    • Target

      fc8ca2f15599f48e7ce602cb36de02386f96e3af2b5cc601d119c694ef13bf1b.exe

    • Size

      45KB

    • MD5

      39361e38e44693d047459ffbc751ac4c

    • SHA1

      e1f3d0e37d6cc506ff5aa13f1656a92f3599500b

    • SHA256

      fc8ca2f15599f48e7ce602cb36de02386f96e3af2b5cc601d119c694ef13bf1b

    • SHA512

      bbb3d3f04d80c63a6278426569ea9bf6e89864f1d4f0868ac1c65ff2083f4438358f16fe4f8a0cf26dc0e261fb3fa528fad645c80324dad81b056cb6c08ee94b

    • SSDEEP

      768:ohP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:UsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks