General

  • Target

    02dbf089352b1e10b8410f7a2d18ce91c76e7556cbef945d4ac07003b8ccbac8.exe

  • Size

    110KB

  • Sample

    241222-hwjd3syley

  • MD5

    70d80ab49e43e4b36a3df76080e9ed27

  • SHA1

    cd2105bea884b84a6007778f29a471a630bc4f17

  • SHA256

    02dbf089352b1e10b8410f7a2d18ce91c76e7556cbef945d4ac07003b8ccbac8

  • SHA512

    73453887591611d1d353a94ed72db0709b31f34a928222ead48fdf835eeffd643b2f022db4c453bcee62aae24c362c7f670cf29cc8d443fbbc2448f74c5f9324

  • SSDEEP

    1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:viyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      02dbf089352b1e10b8410f7a2d18ce91c76e7556cbef945d4ac07003b8ccbac8.exe

    • Size

      110KB

    • MD5

      70d80ab49e43e4b36a3df76080e9ed27

    • SHA1

      cd2105bea884b84a6007778f29a471a630bc4f17

    • SHA256

      02dbf089352b1e10b8410f7a2d18ce91c76e7556cbef945d4ac07003b8ccbac8

    • SHA512

      73453887591611d1d353a94ed72db0709b31f34a928222ead48fdf835eeffd643b2f022db4c453bcee62aae24c362c7f670cf29cc8d443fbbc2448f74c5f9324

    • SSDEEP

      1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:viyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks