General

  • Target

    9c3255c10fcc3cfc866d2860590b705681de1954583df1276b264c9705df6261N.exe

  • Size

    146KB

  • Sample

    241230-r9jfnsxpgm

  • MD5

    2666acb3028167ffe18a695a61e404f0

  • SHA1

    6db15b439e64c48062bc7e3d6a811670f96d51bb

  • SHA256

    9c3255c10fcc3cfc866d2860590b705681de1954583df1276b264c9705df6261

  • SHA512

    be2ee0fec2cbd614d27476475b989486f7769f39d0080894f5e9fdc545c7f8a55f7c155985ba63fd2cce68f23e526148d6c4b528f4f8c8a7cf2a710aa0913a97

  • SSDEEP

    1536:miLOvRmmQegJ3BbmAQ256/ZrwWnL8SOV7CW2YqjhOrmK6o8v0E:miyvRmbLs/ZrwWL/OV7GjQqpo8l

Malware Config

Targets

    • Target

      9c3255c10fcc3cfc866d2860590b705681de1954583df1276b264c9705df6261N.exe

    • Size

      146KB

    • MD5

      2666acb3028167ffe18a695a61e404f0

    • SHA1

      6db15b439e64c48062bc7e3d6a811670f96d51bb

    • SHA256

      9c3255c10fcc3cfc866d2860590b705681de1954583df1276b264c9705df6261

    • SHA512

      be2ee0fec2cbd614d27476475b989486f7769f39d0080894f5e9fdc545c7f8a55f7c155985ba63fd2cce68f23e526148d6c4b528f4f8c8a7cf2a710aa0913a97

    • SSDEEP

      1536:miLOvRmmQegJ3BbmAQ256/ZrwWnL8SOV7CW2YqjhOrmK6o8v0E:miyvRmbLs/ZrwWL/OV7GjQqpo8l

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks