General

  • Target

    5e2c4695696adef7e59317cdb95c3e6a811b681b7b6b67b5e4e067aa855ecf40.exe

  • Size

    110KB

  • Sample

    241230-rmetzaxjgm

  • MD5

    18a9ba494965e9c92f3649d0a489d843

  • SHA1

    a3bfdfa5b90cbf3f2a57234f5653419498524110

  • SHA256

    5e2c4695696adef7e59317cdb95c3e6a811b681b7b6b67b5e4e067aa855ecf40

  • SHA512

    03c9489bce671f5f2100b4073f080c586020a283853321a3a3e2960286c739b2a7bb5eac6b3c6d1bdc76f07982dc10ae69e0d445d2432094e5925e27bf18f240

  • SSDEEP

    1536:fiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:fiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      5e2c4695696adef7e59317cdb95c3e6a811b681b7b6b67b5e4e067aa855ecf40.exe

    • Size

      110KB

    • MD5

      18a9ba494965e9c92f3649d0a489d843

    • SHA1

      a3bfdfa5b90cbf3f2a57234f5653419498524110

    • SHA256

      5e2c4695696adef7e59317cdb95c3e6a811b681b7b6b67b5e4e067aa855ecf40

    • SHA512

      03c9489bce671f5f2100b4073f080c586020a283853321a3a3e2960286c739b2a7bb5eac6b3c6d1bdc76f07982dc10ae69e0d445d2432094e5925e27bf18f240

    • SSDEEP

      1536:fiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:fiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks