General

  • Target

    4bf12ee6dd5bde3e1351e475490ea9478bdc2396d71d824fd9f1ea96be77947cN.exe

  • Size

    34KB

  • Sample

    250101-3jgpya1jgv

  • MD5

    73e3fff91c5ec5a431371aaacfa08cc0

  • SHA1

    e1dae3ddb4862c724293076d15a30a0987426ebb

  • SHA256

    4bf12ee6dd5bde3e1351e475490ea9478bdc2396d71d824fd9f1ea96be77947c

  • SHA512

    081a5d2133ce2c7e7eb0ae6e80b5c2a662365ced1cebd581a78f693c2479292bae55140f9e7e618ddd1b32e33917198b61835692644682692305c518344009f7

  • SSDEEP

    768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:rpYoX58z1uirL98xMWnT0OQ9Ji

Malware Config

Targets

    • Target

      4bf12ee6dd5bde3e1351e475490ea9478bdc2396d71d824fd9f1ea96be77947cN.exe

    • Size

      34KB

    • MD5

      73e3fff91c5ec5a431371aaacfa08cc0

    • SHA1

      e1dae3ddb4862c724293076d15a30a0987426ebb

    • SHA256

      4bf12ee6dd5bde3e1351e475490ea9478bdc2396d71d824fd9f1ea96be77947c

    • SHA512

      081a5d2133ce2c7e7eb0ae6e80b5c2a662365ced1cebd581a78f693c2479292bae55140f9e7e618ddd1b32e33917198b61835692644682692305c518344009f7

    • SSDEEP

      768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:rpYoX58z1uirL98xMWnT0OQ9Ji

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks