General

  • Target

    7c4e5474a56a2c41b510b1e3b02304250ae777cabf28435dc83a59b185141c65.exe

  • Size

    45KB

  • Sample

    241226-ptkmpawkfp

  • MD5

    8a97d35d02dbd3c01183f70a2938f60c

  • SHA1

    1c6c0b90a9a5c794b7b3534a11d0ec8993e387bb

  • SHA256

    7c4e5474a56a2c41b510b1e3b02304250ae777cabf28435dc83a59b185141c65

  • SHA512

    2b0eb718854d4791e68487c575c16769501a457fd69ffd0c4b7d55b000be71db169b02ab8d52f8fc735f75147bc21d3e90a4c63ebed6b55c2bf61da54d6d7ace

  • SSDEEP

    768:MhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:gsWE9N5dFu53dsniQaB/xZ14n7zIF+qB

Malware Config

Targets

    • Target

      7c4e5474a56a2c41b510b1e3b02304250ae777cabf28435dc83a59b185141c65.exe

    • Size

      45KB

    • MD5

      8a97d35d02dbd3c01183f70a2938f60c

    • SHA1

      1c6c0b90a9a5c794b7b3534a11d0ec8993e387bb

    • SHA256

      7c4e5474a56a2c41b510b1e3b02304250ae777cabf28435dc83a59b185141c65

    • SHA512

      2b0eb718854d4791e68487c575c16769501a457fd69ffd0c4b7d55b000be71db169b02ab8d52f8fc735f75147bc21d3e90a4c63ebed6b55c2bf61da54d6d7ace

    • SSDEEP

      768:MhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:gsWE9N5dFu53dsniQaB/xZ14n7zIF+qB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks