General

  • Target

    7a20772521bba0f2baf27c4e0ba99ea20f93964958ba6103f3625c5e975e250a.exe

  • Size

    160KB

  • Sample

    241120-y92qksspdt

  • MD5

    569b8f3aa497826d3acf8f755593c2f3

  • SHA1

    5075d354f475c9bc73ce903e42ef18fd65b04975

  • SHA256

    7a20772521bba0f2baf27c4e0ba99ea20f93964958ba6103f3625c5e975e250a

  • SHA512

    c742e592bee729ef9fac420984d169c6c9514b9636a25b284636f637cf5b5ff5ef96796780bf0304423e026304d6fac44049eb523e1a139513e36ea94a869240

  • SSDEEP

    1536:oEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:rY+4MiIkLZJNAQ9J6vu

Malware Config

Targets

    • Target

      7a20772521bba0f2baf27c4e0ba99ea20f93964958ba6103f3625c5e975e250a.exe

    • Size

      160KB

    • MD5

      569b8f3aa497826d3acf8f755593c2f3

    • SHA1

      5075d354f475c9bc73ce903e42ef18fd65b04975

    • SHA256

      7a20772521bba0f2baf27c4e0ba99ea20f93964958ba6103f3625c5e975e250a

    • SHA512

      c742e592bee729ef9fac420984d169c6c9514b9636a25b284636f637cf5b5ff5ef96796780bf0304423e026304d6fac44049eb523e1a139513e36ea94a869240

    • SSDEEP

      1536:oEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:rY+4MiIkLZJNAQ9J6vu

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks