General

  • Target

    5d60f3a4b269095915b1c468e81d0037f9a44832466e3ae21e3c75bc222e0a3eN.exe

  • Size

    110KB

  • Sample

    241222-nqrq6awpb1

  • MD5

    b613d1dcf2bb955548ae014b20954610

  • SHA1

    3a754e4757cc409a58a8710bbe8221fc800369dd

  • SHA256

    5d60f3a4b269095915b1c468e81d0037f9a44832466e3ae21e3c75bc222e0a3e

  • SHA512

    31d9de4f938a1b53cbcb52ab92fa042f39655788b99a9ba5cef4206bc061a24c048a17a127a6fd71f820a724465c6a55befdf990016cd374eeb9c4541d487749

  • SSDEEP

    1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:viyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      5d60f3a4b269095915b1c468e81d0037f9a44832466e3ae21e3c75bc222e0a3eN.exe

    • Size

      110KB

    • MD5

      b613d1dcf2bb955548ae014b20954610

    • SHA1

      3a754e4757cc409a58a8710bbe8221fc800369dd

    • SHA256

      5d60f3a4b269095915b1c468e81d0037f9a44832466e3ae21e3c75bc222e0a3e

    • SHA512

      31d9de4f938a1b53cbcb52ab92fa042f39655788b99a9ba5cef4206bc061a24c048a17a127a6fd71f820a724465c6a55befdf990016cd374eeb9c4541d487749

    • SSDEEP

      1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:viyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks