General

  • Target

    01f86c877a31c09419709a1d0516d27de4ecee21ae038b2414ec4f7944c2f424N.exe

  • Size

    110KB

  • Sample

    241231-2rm19atkex

  • MD5

    8ea6e3a6bb58694cf338004689fc6880

  • SHA1

    6b48fabb0993d71d9953117246597df8464c0186

  • SHA256

    01f86c877a31c09419709a1d0516d27de4ecee21ae038b2414ec4f7944c2f424

  • SHA512

    4498d76e2a22b1b1e6d30b238f761f5d1b48132083dfc7bc31d695185a6305bf8e198053663210710ffcf1d82299d702d80941cc9d7e71de947881a6d2ed8a70

  • SSDEEP

    1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:uiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      01f86c877a31c09419709a1d0516d27de4ecee21ae038b2414ec4f7944c2f424N.exe

    • Size

      110KB

    • MD5

      8ea6e3a6bb58694cf338004689fc6880

    • SHA1

      6b48fabb0993d71d9953117246597df8464c0186

    • SHA256

      01f86c877a31c09419709a1d0516d27de4ecee21ae038b2414ec4f7944c2f424

    • SHA512

      4498d76e2a22b1b1e6d30b238f761f5d1b48132083dfc7bc31d695185a6305bf8e198053663210710ffcf1d82299d702d80941cc9d7e71de947881a6d2ed8a70

    • SSDEEP

      1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:uiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks