General

  • Target

    d5ea468846b0aaf412f040c5f981d78c7b8dd39e45dc5b4b8a3928c9c184d778N.exe

  • Size

    110KB

  • Sample

    241226-qb8ggawpbk

  • MD5

    fdd0095372dce49220502db390d45d00

  • SHA1

    5794373656acb4bc2576694a8a42e68ca033418b

  • SHA256

    d5ea468846b0aaf412f040c5f981d78c7b8dd39e45dc5b4b8a3928c9c184d778

  • SHA512

    a217c2ee1e9762713264255c6e30fa3e6f527b435a326151b08d496d9dd94efa6964e5f7cda4fd3398cf7fe90049695983a921cdb1eb074a001953c0de7b69ed

  • SSDEEP

    1536:siLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:siyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      d5ea468846b0aaf412f040c5f981d78c7b8dd39e45dc5b4b8a3928c9c184d778N.exe

    • Size

      110KB

    • MD5

      fdd0095372dce49220502db390d45d00

    • SHA1

      5794373656acb4bc2576694a8a42e68ca033418b

    • SHA256

      d5ea468846b0aaf412f040c5f981d78c7b8dd39e45dc5b4b8a3928c9c184d778

    • SHA512

      a217c2ee1e9762713264255c6e30fa3e6f527b435a326151b08d496d9dd94efa6964e5f7cda4fd3398cf7fe90049695983a921cdb1eb074a001953c0de7b69ed

    • SSDEEP

      1536:siLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:siyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks