General

  • Target

    c368bb9fb98c03397a7fc8f6b950623c9756a32b5e8020d84ae066db235d0dcd.exe

  • Size

    110KB

  • Sample

    250101-wjlwbsynam

  • MD5

    ead6494d4be31c7c5be4ead485e60428

  • SHA1

    9e44a63519dd220f9df4b899fc046d57d6502ccf

  • SHA256

    c368bb9fb98c03397a7fc8f6b950623c9756a32b5e8020d84ae066db235d0dcd

  • SHA512

    e18c3ec94c86cf81131859b5c8c4967fe1e2920dc27eaa587fd618f1558b055cdc606683b3557141806fb35c9ee0491b8b615e9ed5900bc5b055323b278796f3

  • SSDEEP

    1536:niLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:niyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      c368bb9fb98c03397a7fc8f6b950623c9756a32b5e8020d84ae066db235d0dcd.exe

    • Size

      110KB

    • MD5

      ead6494d4be31c7c5be4ead485e60428

    • SHA1

      9e44a63519dd220f9df4b899fc046d57d6502ccf

    • SHA256

      c368bb9fb98c03397a7fc8f6b950623c9756a32b5e8020d84ae066db235d0dcd

    • SHA512

      e18c3ec94c86cf81131859b5c8c4967fe1e2920dc27eaa587fd618f1558b055cdc606683b3557141806fb35c9ee0491b8b615e9ed5900bc5b055323b278796f3

    • SSDEEP

      1536:niLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:niyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks