General

  • Target

    5c37fd702e356bc2d2d30e3916676ad233202156a2261015eaedb919acd904f2.exe

  • Size

    45KB

  • Sample

    241230-qyrggawmfp

  • MD5

    138e764718fc95127d7e45ade0abf6bc

  • SHA1

    533e78a80137bfb198103208dd7749d790f25eec

  • SHA256

    5c37fd702e356bc2d2d30e3916676ad233202156a2261015eaedb919acd904f2

  • SHA512

    ba637ce8b6e9e3fa19df672e2077bf61a09fc9a425e0482ba8a249658b8154219b44ef2671c0d654bafc95ffa4f86a2a189deb8d15644ea10693be31afdc2480

  • SSDEEP

    768:jhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2N:1sWE9N5dFu53dsniQaB/xZ14n7zIF+qx

Malware Config

Targets

    • Target

      5c37fd702e356bc2d2d30e3916676ad233202156a2261015eaedb919acd904f2.exe

    • Size

      45KB

    • MD5

      138e764718fc95127d7e45ade0abf6bc

    • SHA1

      533e78a80137bfb198103208dd7749d790f25eec

    • SHA256

      5c37fd702e356bc2d2d30e3916676ad233202156a2261015eaedb919acd904f2

    • SHA512

      ba637ce8b6e9e3fa19df672e2077bf61a09fc9a425e0482ba8a249658b8154219b44ef2671c0d654bafc95ffa4f86a2a189deb8d15644ea10693be31afdc2480

    • SSDEEP

      768:jhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2N:1sWE9N5dFu53dsniQaB/xZ14n7zIF+qx

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks