General

  • Target

    ac7cecb553b11dd599bd681120c48d200f0a67062db075764989a69d32a9de00N.exe

  • Size

    45KB

  • Sample

    250103-1cdzcstrct

  • MD5

    a5cdbd901796d8965cc7d0385f3819a0

  • SHA1

    8c1e4f73d214cbb64c6d174e98752ae84e55bde0

  • SHA256

    ac7cecb553b11dd599bd681120c48d200f0a67062db075764989a69d32a9de00

  • SHA512

    f4250dde058ed7e1dcc09c2f7077ff5acd5198d2c64e3f5472668cd71f2217d944356be3d3ad98ca5d5930a739400a12059179a4122dff03977a855483bb6709

  • SSDEEP

    768:PhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:ZsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      ac7cecb553b11dd599bd681120c48d200f0a67062db075764989a69d32a9de00N.exe

    • Size

      45KB

    • MD5

      a5cdbd901796d8965cc7d0385f3819a0

    • SHA1

      8c1e4f73d214cbb64c6d174e98752ae84e55bde0

    • SHA256

      ac7cecb553b11dd599bd681120c48d200f0a67062db075764989a69d32a9de00

    • SHA512

      f4250dde058ed7e1dcc09c2f7077ff5acd5198d2c64e3f5472668cd71f2217d944356be3d3ad98ca5d5930a739400a12059179a4122dff03977a855483bb6709

    • SSDEEP

      768:PhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:ZsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks