General

  • Target

    00e61a99889fd0f148d61162e012fbe35cc2fe397c1d4bff7ba908f91456d1bb.exe

  • Size

    45KB

  • Sample

    250102-bwlqwaxrak

  • MD5

    a1ae80d6cc39e8111cc5cbe18c68c34a

  • SHA1

    53fcf5b5b67ba7e26d3696bfc1bcdbfcc850c209

  • SHA256

    00e61a99889fd0f148d61162e012fbe35cc2fe397c1d4bff7ba908f91456d1bb

  • SHA512

    12b46229ea9c2cdd82227ab03c36a70438c69f6fd3e962d66b74d009b65eaddd8c94c35b845e008c05e658937a2bdc784bd0c9f706d1a68d366da1bc976bc3fd

  • SSDEEP

    768:nhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:hsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      00e61a99889fd0f148d61162e012fbe35cc2fe397c1d4bff7ba908f91456d1bb.exe

    • Size

      45KB

    • MD5

      a1ae80d6cc39e8111cc5cbe18c68c34a

    • SHA1

      53fcf5b5b67ba7e26d3696bfc1bcdbfcc850c209

    • SHA256

      00e61a99889fd0f148d61162e012fbe35cc2fe397c1d4bff7ba908f91456d1bb

    • SHA512

      12b46229ea9c2cdd82227ab03c36a70438c69f6fd3e962d66b74d009b65eaddd8c94c35b845e008c05e658937a2bdc784bd0c9f706d1a68d366da1bc976bc3fd

    • SSDEEP

      768:nhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:hsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks