General

  • Target

    d5bc0a6b071a77cdc97e570a4e8afd0b498dbfd6dca05dbfbdf74931e816ec13.exe

  • Size

    146KB

  • Sample

    250102-lwk5fsyrhr

  • MD5

    b90d5c819d38160fd02d692b7fc3aa5f

  • SHA1

    c22f4209c3ab4007c25a767e27d2bd8e419d1979

  • SHA256

    d5bc0a6b071a77cdc97e570a4e8afd0b498dbfd6dca05dbfbdf74931e816ec13

  • SHA512

    67f57967bf9d9c29c920338b5fb5a064117383a125a2b2193289e32fd1d79b0d51d67ee011030e13dfdcca9332a526400ccf8371a8a631c3fae046a09dd6dbf3

  • SSDEEP

    1536:ziLOvRmmQegJ3BbmAQ256/ZrwWnL8SOV7CW2YqjhOrmK6o8v0E5:ziyvRmbLs/ZrwWL/OV7GjQqpo8l5

Malware Config

Targets

    • Target

      d5bc0a6b071a77cdc97e570a4e8afd0b498dbfd6dca05dbfbdf74931e816ec13.exe

    • Size

      146KB

    • MD5

      b90d5c819d38160fd02d692b7fc3aa5f

    • SHA1

      c22f4209c3ab4007c25a767e27d2bd8e419d1979

    • SHA256

      d5bc0a6b071a77cdc97e570a4e8afd0b498dbfd6dca05dbfbdf74931e816ec13

    • SHA512

      67f57967bf9d9c29c920338b5fb5a064117383a125a2b2193289e32fd1d79b0d51d67ee011030e13dfdcca9332a526400ccf8371a8a631c3fae046a09dd6dbf3

    • SSDEEP

      1536:ziLOvRmmQegJ3BbmAQ256/ZrwWnL8SOV7CW2YqjhOrmK6o8v0E5:ziyvRmbLs/ZrwWL/OV7GjQqpo8l5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks