General

  • Target

    4c394c70a789d0a4813d80157f004945d6ed61af32bf467ab59e829763357f0a.exe

  • Size

    45KB

  • Sample

    250102-hfnnvs1lhj

  • MD5

    57f4434acd395c7ef77b773f2a47d841

  • SHA1

    7c42c521f370267bd524300fd866f6ad2345ace6

  • SHA256

    4c394c70a789d0a4813d80157f004945d6ed61af32bf467ab59e829763357f0a

  • SHA512

    85195024afaa2651d922bdefd509c4bfea59980f0ac6459a9c246b873b6224c3a24589f36d40b2bd1109eb93a8a3cf3d09f92cfa00d6d8a5c47676d9f23be50b

  • SSDEEP

    768:ihP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2v:OsWE9N5dFu53dsniQaB/xZ14n7zIF+qb

Malware Config

Targets

    • Target

      4c394c70a789d0a4813d80157f004945d6ed61af32bf467ab59e829763357f0a.exe

    • Size

      45KB

    • MD5

      57f4434acd395c7ef77b773f2a47d841

    • SHA1

      7c42c521f370267bd524300fd866f6ad2345ace6

    • SHA256

      4c394c70a789d0a4813d80157f004945d6ed61af32bf467ab59e829763357f0a

    • SHA512

      85195024afaa2651d922bdefd509c4bfea59980f0ac6459a9c246b873b6224c3a24589f36d40b2bd1109eb93a8a3cf3d09f92cfa00d6d8a5c47676d9f23be50b

    • SSDEEP

      768:ihP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2v:OsWE9N5dFu53dsniQaB/xZ14n7zIF+qb

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks