General

  • Target

    90c49cd9401770a015ff0ed8732a2e38c311e810dcd364d4523a42ece72072f6N.exe

  • Size

    146KB

  • Sample

    250101-rqsj8sxrbs

  • MD5

    f06acfe2d7f936ee0285d13c9eb59720

  • SHA1

    723ff326583286be25e24098ef9a6bdd8b669c43

  • SHA256

    90c49cd9401770a015ff0ed8732a2e38c311e810dcd364d4523a42ece72072f6

  • SHA512

    2871364f102de1d338bd3b466f0200252eff541f8e00631faed55540f13d93d6f0007f4d38ac88a154223caff3a2b283b9e537923ae829f16683fb317a6076cc

  • SSDEEP

    1536:ziLOvRmmQegJ3BbmAQ256/ZrwWnL8SOV7CW2YqjhOrmK6o8v0E:ziyvRmbLs/ZrwWL/OV7GjQqpo8l

Malware Config

Targets

    • Target

      90c49cd9401770a015ff0ed8732a2e38c311e810dcd364d4523a42ece72072f6N.exe

    • Size

      146KB

    • MD5

      f06acfe2d7f936ee0285d13c9eb59720

    • SHA1

      723ff326583286be25e24098ef9a6bdd8b669c43

    • SHA256

      90c49cd9401770a015ff0ed8732a2e38c311e810dcd364d4523a42ece72072f6

    • SHA512

      2871364f102de1d338bd3b466f0200252eff541f8e00631faed55540f13d93d6f0007f4d38ac88a154223caff3a2b283b9e537923ae829f16683fb317a6076cc

    • SSDEEP

      1536:ziLOvRmmQegJ3BbmAQ256/ZrwWnL8SOV7CW2YqjhOrmK6o8v0E:ziyvRmbLs/ZrwWL/OV7GjQqpo8l

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks