General

  • Target

    cdc53b65b5fd8ab071d8be43f7e02da26539b24423a104c7cb088622d1362c24.exe

  • Size

    45KB

  • Sample

    250109-dpr1eswjfy

  • MD5

    e65a406efbf03fa7849601b40fcbacbf

  • SHA1

    24bd8760a0dc797db9ec6f2f69fa2a53ff34423a

  • SHA256

    cdc53b65b5fd8ab071d8be43f7e02da26539b24423a104c7cb088622d1362c24

  • SHA512

    134ab82ade829e1337999ba06c3094100278e1d73e0ca4d6b3439dea42119373e44a300d74741dd3e460ce2d995248b93f3f00b98383ab2dcfb4caafaa385a2f

  • SSDEEP

    768:whP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2t:MsWE9N5dFu53dsniQaB/xZ14n7zIF+qR

Malware Config

Targets

    • Target

      cdc53b65b5fd8ab071d8be43f7e02da26539b24423a104c7cb088622d1362c24.exe

    • Size

      45KB

    • MD5

      e65a406efbf03fa7849601b40fcbacbf

    • SHA1

      24bd8760a0dc797db9ec6f2f69fa2a53ff34423a

    • SHA256

      cdc53b65b5fd8ab071d8be43f7e02da26539b24423a104c7cb088622d1362c24

    • SHA512

      134ab82ade829e1337999ba06c3094100278e1d73e0ca4d6b3439dea42119373e44a300d74741dd3e460ce2d995248b93f3f00b98383ab2dcfb4caafaa385a2f

    • SSDEEP

      768:whP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2t:MsWE9N5dFu53dsniQaB/xZ14n7zIF+qR

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks