General

  • Target

    65a67b7e0bd34ae4c1de6de8b3c6c3db7c09ae526af4914bb012f13abf927d26.exe

  • Size

    45KB

  • Sample

    250123-cbjapawngt

  • MD5

    35820dc85ab582b631850897ac4610ad

  • SHA1

    cf2412235cae83b417eb91ddf925d6c330778239

  • SHA256

    65a67b7e0bd34ae4c1de6de8b3c6c3db7c09ae526af4914bb012f13abf927d26

  • SHA512

    4dc39e9b9a353703109340bc146c44f5f1dd4437003bbcb3f09830ed65e7db106507f581a6c06b0f0ed1ec5b1a59101c03a14417f184aee0e031b3c86886f3ec

  • SSDEEP

    768:PhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:ZsWE9N5dFu53dsniQaB/xZ14n7zIF+qL

Malware Config

Targets

    • Target

      65a67b7e0bd34ae4c1de6de8b3c6c3db7c09ae526af4914bb012f13abf927d26.exe

    • Size

      45KB

    • MD5

      35820dc85ab582b631850897ac4610ad

    • SHA1

      cf2412235cae83b417eb91ddf925d6c330778239

    • SHA256

      65a67b7e0bd34ae4c1de6de8b3c6c3db7c09ae526af4914bb012f13abf927d26

    • SHA512

      4dc39e9b9a353703109340bc146c44f5f1dd4437003bbcb3f09830ed65e7db106507f581a6c06b0f0ed1ec5b1a59101c03a14417f184aee0e031b3c86886f3ec

    • SSDEEP

      768:PhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:ZsWE9N5dFu53dsniQaB/xZ14n7zIF+qL

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks