General

  • Target

    d90d962ca8e208a50bae1c7b71007dd46782ff66b76d4182eca7bd7b40b2cd3bN.exe

  • Size

    113KB

  • Sample

    241117-ewq75szpgs

  • MD5

    d5ce1f55b1c6fbe97badc286bd67d550

  • SHA1

    51355cc8d0706168c6c452b4116ab34ed2ae463f

  • SHA256

    d90d962ca8e208a50bae1c7b71007dd46782ff66b76d4182eca7bd7b40b2cd3b

  • SHA512

    988e6699223f039fee43e1f9a16b21b2f40a1e2a603fd66b68c748420d2a2b40014ea3d9e48d56d3e18dc8b472126b01e9b0c677757d0d90b7f739dc8a259e91

  • SSDEEP

    1536:3iLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0E:3iyvRmDLs/ZrwWjjAqGcfzWH

Malware Config

Targets

    • Target

      d90d962ca8e208a50bae1c7b71007dd46782ff66b76d4182eca7bd7b40b2cd3bN.exe

    • Size

      113KB

    • MD5

      d5ce1f55b1c6fbe97badc286bd67d550

    • SHA1

      51355cc8d0706168c6c452b4116ab34ed2ae463f

    • SHA256

      d90d962ca8e208a50bae1c7b71007dd46782ff66b76d4182eca7bd7b40b2cd3b

    • SHA512

      988e6699223f039fee43e1f9a16b21b2f40a1e2a603fd66b68c748420d2a2b40014ea3d9e48d56d3e18dc8b472126b01e9b0c677757d0d90b7f739dc8a259e91

    • SSDEEP

      1536:3iLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0E:3iyvRmDLs/ZrwWjjAqGcfzWH

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks