General

  • Target

    454146b9e6283876a792643894a2b1c38e0fead807ce6602bf394478ce3ceca3.exe

  • Size

    89KB

  • Sample

    250112-f682daylfs

  • MD5

    c9faccaef066e49fcf7dc496dd5cf417

  • SHA1

    86c3473bf10f0371807a48773903a2b1a9b18ac4

  • SHA256

    454146b9e6283876a792643894a2b1c38e0fead807ce6602bf394478ce3ceca3

  • SHA512

    867f30cc87c04cac3ff8f539d93e91687499e9bbe2c6357361275366dc391710a4e88e184168ef976ce08bb89cd5fe0e3331d84d36faf6e1659b40c225cd11a6

  • SSDEEP

    1536:v1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:N+4MJIkLZJNAQ9Jo9u

Malware Config

Targets

    • Target

      454146b9e6283876a792643894a2b1c38e0fead807ce6602bf394478ce3ceca3.exe

    • Size

      89KB

    • MD5

      c9faccaef066e49fcf7dc496dd5cf417

    • SHA1

      86c3473bf10f0371807a48773903a2b1a9b18ac4

    • SHA256

      454146b9e6283876a792643894a2b1c38e0fead807ce6602bf394478ce3ceca3

    • SHA512

      867f30cc87c04cac3ff8f539d93e91687499e9bbe2c6357361275366dc391710a4e88e184168ef976ce08bb89cd5fe0e3331d84d36faf6e1659b40c225cd11a6

    • SSDEEP

      1536:v1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:N+4MJIkLZJNAQ9Jo9u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks