General

  • Target

    7909fff47394cd118aa6ee157a079d66216e657933f385afae9d0aaff6ea0b31.exe

  • Size

    110KB

  • Sample

    241230-ygyhfsykcx

  • MD5

    4295530629cd45bfad649301ac41f50f

  • SHA1

    09001ba13ca6239f3a39b21b48995a89cd7dc8ed

  • SHA256

    7909fff47394cd118aa6ee157a079d66216e657933f385afae9d0aaff6ea0b31

  • SHA512

    a120906ea54705a88eb554545f45435e450d7f42b660ae755df268e0151b49b925ef2b88b98a19d41501d1ac7dd9441cffe0fe11974f3526dc74bfb62809ef97

  • SSDEEP

    1536:+iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:+iyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      7909fff47394cd118aa6ee157a079d66216e657933f385afae9d0aaff6ea0b31.exe

    • Size

      110KB

    • MD5

      4295530629cd45bfad649301ac41f50f

    • SHA1

      09001ba13ca6239f3a39b21b48995a89cd7dc8ed

    • SHA256

      7909fff47394cd118aa6ee157a079d66216e657933f385afae9d0aaff6ea0b31

    • SHA512

      a120906ea54705a88eb554545f45435e450d7f42b660ae755df268e0151b49b925ef2b88b98a19d41501d1ac7dd9441cffe0fe11974f3526dc74bfb62809ef97

    • SSDEEP

      1536:+iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:+iyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks