General

  • Target

    39cdfe92e463f80b21164777dce1399843e181342e3af7444270e0ed65fa9b12N.exe

  • Size

    45KB

  • Sample

    250107-pe9chasneq

  • MD5

    72fff3586e2e1b8a53374a4a5e313d80

  • SHA1

    29a5d31e63a6c492b40789cf72b823d1f8ac598e

  • SHA256

    39cdfe92e463f80b21164777dce1399843e181342e3af7444270e0ed65fa9b12

  • SHA512

    f720e13475d928553667aea627dfc52201d7d15c711537752adbc003be2155234817c86ef4326f9af1f6da90c598a620faae506d6f3c10b0c95d4c3f1b75c7b8

  • SSDEEP

    768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qB

Malware Config

Targets

    • Target

      39cdfe92e463f80b21164777dce1399843e181342e3af7444270e0ed65fa9b12N.exe

    • Size

      45KB

    • MD5

      72fff3586e2e1b8a53374a4a5e313d80

    • SHA1

      29a5d31e63a6c492b40789cf72b823d1f8ac598e

    • SHA256

      39cdfe92e463f80b21164777dce1399843e181342e3af7444270e0ed65fa9b12

    • SHA512

      f720e13475d928553667aea627dfc52201d7d15c711537752adbc003be2155234817c86ef4326f9af1f6da90c598a620faae506d6f3c10b0c95d4c3f1b75c7b8

    • SSDEEP

      768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks