General

  • Target

    b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe

  • Size

    34KB

  • Sample

    250102-g7v2ksxqdw

  • MD5

    fdb8f7f3001e0e4d523fec27c9c7ba34

  • SHA1

    b26714a211e68377fe4adcd30487ed5cfb2b28d9

  • SHA256

    b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d

  • SHA512

    b32d502591903fa2de04afe1b1936b8a1292b86075d60b0ae8e5b1ee2d9af5a957f63f50d6e2ae25c5d3fa0c3af314406c1528f185c104736bfc684af958e005

  • SSDEEP

    768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:rpYoX58z1uirL98xMWnT0OQ9JW

Malware Config

Targets

    • Target

      b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d.exe

    • Size

      34KB

    • MD5

      fdb8f7f3001e0e4d523fec27c9c7ba34

    • SHA1

      b26714a211e68377fe4adcd30487ed5cfb2b28d9

    • SHA256

      b6bb351fab5b43f1500c1e5f1e959a0d7bde8df0685bb20b6aa28fb8d636657d

    • SHA512

      b32d502591903fa2de04afe1b1936b8a1292b86075d60b0ae8e5b1ee2d9af5a957f63f50d6e2ae25c5d3fa0c3af314406c1528f185c104736bfc684af958e005

    • SSDEEP

      768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JW:rpYoX58z1uirL98xMWnT0OQ9JW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks