General

  • Target

    aecd4f769a6bccfc51da04933ed1edb3cdf6138394a1d80a47a055a71b66dd24N.exe

  • Size

    110KB

  • Sample

    250103-p6tfcsxqcn

  • MD5

    4e283851054d25fd3d13b0f6bc296fa0

  • SHA1

    30bc809eaae337468f3109630e8fb6f2146e4b4c

  • SHA256

    aecd4f769a6bccfc51da04933ed1edb3cdf6138394a1d80a47a055a71b66dd24

  • SHA512

    11b40cb4b81f6362523b6465f058449c151aeac685cf465520ab94ff6d37a016f815cd0423fe22ff8c8bd3d6b2060ffc7a3d8a3e9f7c7582151d4a86183ac93f

  • SSDEEP

    1536:RiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:RiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      aecd4f769a6bccfc51da04933ed1edb3cdf6138394a1d80a47a055a71b66dd24N.exe

    • Size

      110KB

    • MD5

      4e283851054d25fd3d13b0f6bc296fa0

    • SHA1

      30bc809eaae337468f3109630e8fb6f2146e4b4c

    • SHA256

      aecd4f769a6bccfc51da04933ed1edb3cdf6138394a1d80a47a055a71b66dd24

    • SHA512

      11b40cb4b81f6362523b6465f058449c151aeac685cf465520ab94ff6d37a016f815cd0423fe22ff8c8bd3d6b2060ffc7a3d8a3e9f7c7582151d4a86183ac93f

    • SSDEEP

      1536:RiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:RiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks