General

  • Target

    922d0e13d0e1e6c0169885bebb00ff36e05227ca4d9783e572ee1b419cc36ef1.exe

  • Size

    110KB

  • Sample

    241230-1xqtna1jfp

  • MD5

    02f9670925e7d13ad6409022574a086d

  • SHA1

    2533d423f4614801fe25c08bde2a11c244ed9a92

  • SHA256

    922d0e13d0e1e6c0169885bebb00ff36e05227ca4d9783e572ee1b419cc36ef1

  • SHA512

    7445eeaa83a8cdb6216ae69ba671a8b1e830d9a76fde872577ab77baf347feca5779fc18dd88472e88de62a0166e6eed31b307f18dc363c775cc19354950f4b6

  • SSDEEP

    1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:uiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      922d0e13d0e1e6c0169885bebb00ff36e05227ca4d9783e572ee1b419cc36ef1.exe

    • Size

      110KB

    • MD5

      02f9670925e7d13ad6409022574a086d

    • SHA1

      2533d423f4614801fe25c08bde2a11c244ed9a92

    • SHA256

      922d0e13d0e1e6c0169885bebb00ff36e05227ca4d9783e572ee1b419cc36ef1

    • SHA512

      7445eeaa83a8cdb6216ae69ba671a8b1e830d9a76fde872577ab77baf347feca5779fc18dd88472e88de62a0166e6eed31b307f18dc363c775cc19354950f4b6

    • SSDEEP

      1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:uiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks