General

  • Target

    c643c90e20e6fcfc9327cc33dc3e8d239a986acbbcdbd49f8ee5706394769308N.exe

  • Size

    110KB

  • Sample

    241231-zmyk3symes

  • MD5

    385aa9fa6ab24d6ff532877ecfb83c90

  • SHA1

    5987c0c674c7f7d6b32c1361fdac0b82983f30e5

  • SHA256

    c643c90e20e6fcfc9327cc33dc3e8d239a986acbbcdbd49f8ee5706394769308

  • SHA512

    af04fe6b2540a7ba10c71d8cd30ca900ef6c289cd63426e5d60959409648f6b75e871e32686393f91151684dc300ebcc5557b7103cdcfe533a7d2f00a82429b9

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:liyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      c643c90e20e6fcfc9327cc33dc3e8d239a986acbbcdbd49f8ee5706394769308N.exe

    • Size

      110KB

    • MD5

      385aa9fa6ab24d6ff532877ecfb83c90

    • SHA1

      5987c0c674c7f7d6b32c1361fdac0b82983f30e5

    • SHA256

      c643c90e20e6fcfc9327cc33dc3e8d239a986acbbcdbd49f8ee5706394769308

    • SHA512

      af04fe6b2540a7ba10c71d8cd30ca900ef6c289cd63426e5d60959409648f6b75e871e32686393f91151684dc300ebcc5557b7103cdcfe533a7d2f00a82429b9

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:liyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks