General

  • Target

    8d7629f117619e969962bdfd1fc1438dfd245e34374c8e2d6f5670f5b7ceb6a9N.exe

  • Size

    45KB

  • Sample

    241226-stlrjaymcy

  • MD5

    af8df5276af468bf893a15692eb9c320

  • SHA1

    5fe69f7c14c009121fab48ae948b564ae5a81cd5

  • SHA256

    8d7629f117619e969962bdfd1fc1438dfd245e34374c8e2d6f5670f5b7ceb6a9

  • SHA512

    5272ca38ade24a9193058d6287ad3d571c2c4c679a39fcdd6ae327d32e6e2de63d39cf9393fab1662758453b829d74624352c0ab3f58c7ae8926a650050571e6

  • SSDEEP

    768:ohP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:UsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      8d7629f117619e969962bdfd1fc1438dfd245e34374c8e2d6f5670f5b7ceb6a9N.exe

    • Size

      45KB

    • MD5

      af8df5276af468bf893a15692eb9c320

    • SHA1

      5fe69f7c14c009121fab48ae948b564ae5a81cd5

    • SHA256

      8d7629f117619e969962bdfd1fc1438dfd245e34374c8e2d6f5670f5b7ceb6a9

    • SHA512

      5272ca38ade24a9193058d6287ad3d571c2c4c679a39fcdd6ae327d32e6e2de63d39cf9393fab1662758453b829d74624352c0ab3f58c7ae8926a650050571e6

    • SSDEEP

      768:ohP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:UsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks