General

  • Target

    0a88b21ac0a2bbeccfb50c5c3f2a396beba5e363d2a1d051621431b9491b1bfdN.exe

  • Size

    110KB

  • Sample

    241231-dws63avmcw

  • MD5

    67f8893330dc1434cffb1e2bca392740

  • SHA1

    5402830e9c1c6743a60f40cb47422b63ec7116dd

  • SHA256

    0a88b21ac0a2bbeccfb50c5c3f2a396beba5e363d2a1d051621431b9491b1bfd

  • SHA512

    3227727926a78638f45c8836777669a3550df99cda736e9991ec8f512c477e256981fba6b920b247d10d9d53fbe7cbbd31d00de0e56095e7f05d8ec7a9e5e4bd

  • SSDEEP

    1536:fiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:fiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      0a88b21ac0a2bbeccfb50c5c3f2a396beba5e363d2a1d051621431b9491b1bfdN.exe

    • Size

      110KB

    • MD5

      67f8893330dc1434cffb1e2bca392740

    • SHA1

      5402830e9c1c6743a60f40cb47422b63ec7116dd

    • SHA256

      0a88b21ac0a2bbeccfb50c5c3f2a396beba5e363d2a1d051621431b9491b1bfd

    • SHA512

      3227727926a78638f45c8836777669a3550df99cda736e9991ec8f512c477e256981fba6b920b247d10d9d53fbe7cbbd31d00de0e56095e7f05d8ec7a9e5e4bd

    • SSDEEP

      1536:fiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:fiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks