General

  • Target

    8f735214ef7ec49eb83f45a9f8a67d4e0f4aac706af7e302fd4ecfa06f402081.exe

  • Size

    45KB

  • Sample

    241231-cfr4ds1mdx

  • MD5

    8f549cc38189250b05714e7b5210b054

  • SHA1

    67bf6cbc6baf50b9c80c00dd0a857d7ff4b2ae5e

  • SHA256

    8f735214ef7ec49eb83f45a9f8a67d4e0f4aac706af7e302fd4ecfa06f402081

  • SHA512

    2339803a18db4f04463472b4321413e64fb984e545c81d43ad04cdbf1fe68d3c8b2fb732df729f4f825a9aa6ad8e7ac98d203c1decb0084fce2c9649b9057648

  • SSDEEP

    768:jhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:1sWE9N5dFu53dsniQaB/xZ14n7zIF+qj

Malware Config

Targets

    • Target

      8f735214ef7ec49eb83f45a9f8a67d4e0f4aac706af7e302fd4ecfa06f402081.exe

    • Size

      45KB

    • MD5

      8f549cc38189250b05714e7b5210b054

    • SHA1

      67bf6cbc6baf50b9c80c00dd0a857d7ff4b2ae5e

    • SHA256

      8f735214ef7ec49eb83f45a9f8a67d4e0f4aac706af7e302fd4ecfa06f402081

    • SHA512

      2339803a18db4f04463472b4321413e64fb984e545c81d43ad04cdbf1fe68d3c8b2fb732df729f4f825a9aa6ad8e7ac98d203c1decb0084fce2c9649b9057648

    • SSDEEP

      768:jhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:1sWE9N5dFu53dsniQaB/xZ14n7zIF+qj

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks