General

  • Target

    fe4f35fa62caf24b589f27f8a331e5266d111fddca67c6837b1696e57df5bd4aN.exe

  • Size

    45KB

  • Sample

    250102-m9c7fayqdv

  • MD5

    c17bbb3caf3cadbfe36da6d0f836a7f0

  • SHA1

    11b70204c8d5e6b76b50ee725bc04269ed84a16f

  • SHA256

    fe4f35fa62caf24b589f27f8a331e5266d111fddca67c6837b1696e57df5bd4a

  • SHA512

    196c12b79dbacb07418972b70e5e8577a3947aff053984ac3e935285797a78957322a17fecff9b83514cbc9ed5c8c151752bd35e8c7a9f7a2ec9133daa819fc0

  • SSDEEP

    768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2F:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qJ

Malware Config

Targets

    • Target

      fe4f35fa62caf24b589f27f8a331e5266d111fddca67c6837b1696e57df5bd4aN.exe

    • Size

      45KB

    • MD5

      c17bbb3caf3cadbfe36da6d0f836a7f0

    • SHA1

      11b70204c8d5e6b76b50ee725bc04269ed84a16f

    • SHA256

      fe4f35fa62caf24b589f27f8a331e5266d111fddca67c6837b1696e57df5bd4a

    • SHA512

      196c12b79dbacb07418972b70e5e8577a3947aff053984ac3e935285797a78957322a17fecff9b83514cbc9ed5c8c151752bd35e8c7a9f7a2ec9133daa819fc0

    • SSDEEP

      768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2F:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qJ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks