General

  • Target

    dfb780b62e555d3a013a40b4ac3911a4593a25d5028f1f50b49b245af45df246N.exe

  • Size

    45KB

  • Sample

    250109-cl4z5stlfv

  • MD5

    9e79d019da0702d922ef956279d116d0

  • SHA1

    5fa11e3b772550cbacf9c4b89ec7eea3369fc8c5

  • SHA256

    dfb780b62e555d3a013a40b4ac3911a4593a25d5028f1f50b49b245af45df246

  • SHA512

    f2440738458ec76c555de275905bd29d0b6a6a9cec8eeff9a779a341448580cb1947b76ea64ec0172f22661c3949cdd92432d91b56d5bab2fe5571cbbac22795

  • SSDEEP

    768:LhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:tsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

Malware Config

Targets

    • Target

      dfb780b62e555d3a013a40b4ac3911a4593a25d5028f1f50b49b245af45df246N.exe

    • Size

      45KB

    • MD5

      9e79d019da0702d922ef956279d116d0

    • SHA1

      5fa11e3b772550cbacf9c4b89ec7eea3369fc8c5

    • SHA256

      dfb780b62e555d3a013a40b4ac3911a4593a25d5028f1f50b49b245af45df246

    • SHA512

      f2440738458ec76c555de275905bd29d0b6a6a9cec8eeff9a779a341448580cb1947b76ea64ec0172f22661c3949cdd92432d91b56d5bab2fe5571cbbac22795

    • SSDEEP

      768:LhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2P:tsWE9N5dFu53dsniQaB/xZ14n7zIF+q7

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks