General

  • Target

    e8dfc277a9f269239086306b59eea2bb8f0a7857b05b86752d37412da7f3e1d7N.exe

  • Size

    110KB

  • Sample

    250111-cc17ws1jdj

  • MD5

    fe7fae81b46140a0abec1d31f03c17e0

  • SHA1

    f92c7306d3cfb30e4234f1c197821992acb7aa2a

  • SHA256

    e8dfc277a9f269239086306b59eea2bb8f0a7857b05b86752d37412da7f3e1d7

  • SHA512

    dafcce604d5626082944e963720aa09ce68e254b026853718ca69823f9b4109ba26506c5709bf1678f91880340d025400e2989ab94ab6d574c92298304b2201a

  • SSDEEP

    1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:HiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      e8dfc277a9f269239086306b59eea2bb8f0a7857b05b86752d37412da7f3e1d7N.exe

    • Size

      110KB

    • MD5

      fe7fae81b46140a0abec1d31f03c17e0

    • SHA1

      f92c7306d3cfb30e4234f1c197821992acb7aa2a

    • SHA256

      e8dfc277a9f269239086306b59eea2bb8f0a7857b05b86752d37412da7f3e1d7

    • SHA512

      dafcce604d5626082944e963720aa09ce68e254b026853718ca69823f9b4109ba26506c5709bf1678f91880340d025400e2989ab94ab6d574c92298304b2201a

    • SSDEEP

      1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:HiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks