General

  • Target

    7679bd1f03f560ce252ba9ef519dd4b3cb1ab2203907f5c445d1fc6ceda21464N.exe

  • Size

    89KB

  • Sample

    241226-trbn8azpbv

  • MD5

    e089ea4253942f5316cb87f9dcc49fb0

  • SHA1

    598c6816ec842790c07c3de219c025db782029d1

  • SHA256

    7679bd1f03f560ce252ba9ef519dd4b3cb1ab2203907f5c445d1fc6ceda21464

  • SHA512

    fb32f67118b2bf966c13eb5bd4e955d72abec12c4af34dff525f35c691c425fc6e597c117696504be315fd788a0b1900d763e6f7bfabdf0d49b6b30e613bc66e

  • SSDEEP

    1536:t1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox76:v+4MJIkLZJNAQ9Jo96

Malware Config

Targets

    • Target

      7679bd1f03f560ce252ba9ef519dd4b3cb1ab2203907f5c445d1fc6ceda21464N.exe

    • Size

      89KB

    • MD5

      e089ea4253942f5316cb87f9dcc49fb0

    • SHA1

      598c6816ec842790c07c3de219c025db782029d1

    • SHA256

      7679bd1f03f560ce252ba9ef519dd4b3cb1ab2203907f5c445d1fc6ceda21464

    • SHA512

      fb32f67118b2bf966c13eb5bd4e955d72abec12c4af34dff525f35c691c425fc6e597c117696504be315fd788a0b1900d763e6f7bfabdf0d49b6b30e613bc66e

    • SSDEEP

      1536:t1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox76:v+4MJIkLZJNAQ9Jo96

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks