General

  • Target

    cc3ccbadb94bfb1b14e13b8b93ec6c1691ccdbece2d805fe9e81050a3b8cb255.exe

  • Size

    45KB

  • Sample

    250112-espvxayjak

  • MD5

    863ab01aa0b3b64aecb330f85c05b05b

  • SHA1

    39490c027d6c44c5e2e7636f0ae370d1b934cc83

  • SHA256

    cc3ccbadb94bfb1b14e13b8b93ec6c1691ccdbece2d805fe9e81050a3b8cb255

  • SHA512

    4c8c60518b56d8b0c28eac9a2ae626d7bf96d4222d6c8f7c9d97f7c0f7180e8055462f91871bce3e66c97e6affca3036c064b14e319403719aefaef851aab2b0

  • SSDEEP

    768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qB

Malware Config

Targets

    • Target

      cc3ccbadb94bfb1b14e13b8b93ec6c1691ccdbece2d805fe9e81050a3b8cb255.exe

    • Size

      45KB

    • MD5

      863ab01aa0b3b64aecb330f85c05b05b

    • SHA1

      39490c027d6c44c5e2e7636f0ae370d1b934cc83

    • SHA256

      cc3ccbadb94bfb1b14e13b8b93ec6c1691ccdbece2d805fe9e81050a3b8cb255

    • SHA512

      4c8c60518b56d8b0c28eac9a2ae626d7bf96d4222d6c8f7c9d97f7c0f7180e8055462f91871bce3e66c97e6affca3036c064b14e319403719aefaef851aab2b0

    • SSDEEP

      768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks