General

  • Target

    d780de2e67fc7660a536473920dc3c703c6a4f56cbd0466e302c8258a1a26526N.exe

  • Size

    45KB

  • Sample

    250102-fcjvdswpap

  • MD5

    a9f05bb29ce259deab61eba28199dba0

  • SHA1

    78bc586c82b69c15f5b024a917d703458da5655b

  • SHA256

    d780de2e67fc7660a536473920dc3c703c6a4f56cbd0466e302c8258a1a26526

  • SHA512

    1f91e7ea440e36851504543520c7cc0d19a346aba9c65d39a4fe69fc415a266cc7870c5673f5d19b64bb6979400a32524048829265c5db2d31a4d7c34273a70c

  • SSDEEP

    768:ihP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:OsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

Malware Config

Targets

    • Target

      d780de2e67fc7660a536473920dc3c703c6a4f56cbd0466e302c8258a1a26526N.exe

    • Size

      45KB

    • MD5

      a9f05bb29ce259deab61eba28199dba0

    • SHA1

      78bc586c82b69c15f5b024a917d703458da5655b

    • SHA256

      d780de2e67fc7660a536473920dc3c703c6a4f56cbd0466e302c8258a1a26526

    • SHA512

      1f91e7ea440e36851504543520c7cc0d19a346aba9c65d39a4fe69fc415a266cc7870c5673f5d19b64bb6979400a32524048829265c5db2d31a4d7c34273a70c

    • SSDEEP

      768:ihP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:OsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks