General

  • Target

    58261d5e436afecee936ca11f2441cf176fcd4c6b51b8fded8620878e142285bN.exe

  • Size

    110KB

  • Sample

    241231-ch46qs1ngv

  • MD5

    5f3a88d65f17aa4489ba5206dbe44b10

  • SHA1

    aa487aeb8d7a96fdf3f16c238dc95005d77c76bf

  • SHA256

    58261d5e436afecee936ca11f2441cf176fcd4c6b51b8fded8620878e142285b

  • SHA512

    cd33ede53cb6468bb43cee8db87631bda992fe85e50d96ebfdc1f556f3c4af335bf642836cc5845df80614c60aa227f8cab6227af4c7166e15de68106ad38255

  • SSDEEP

    1536:+iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:+iyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      58261d5e436afecee936ca11f2441cf176fcd4c6b51b8fded8620878e142285bN.exe

    • Size

      110KB

    • MD5

      5f3a88d65f17aa4489ba5206dbe44b10

    • SHA1

      aa487aeb8d7a96fdf3f16c238dc95005d77c76bf

    • SHA256

      58261d5e436afecee936ca11f2441cf176fcd4c6b51b8fded8620878e142285b

    • SHA512

      cd33ede53cb6468bb43cee8db87631bda992fe85e50d96ebfdc1f556f3c4af335bf642836cc5845df80614c60aa227f8cab6227af4c7166e15de68106ad38255

    • SSDEEP

      1536:+iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:+iyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks