General

  • Target

    04d5643bf6ce4e67e4f8d24e58b0423ff585daf0034bfda0ca762834c3ffeb8e.exe

  • Size

    110KB

  • Sample

    250102-nmcg3azmds

  • MD5

    0bf1b2c6baa946230d5ed08fe773c265

  • SHA1

    de1e27cbc5f513699e3fa75eadd222cc79137938

  • SHA256

    04d5643bf6ce4e67e4f8d24e58b0423ff585daf0034bfda0ca762834c3ffeb8e

  • SHA512

    9f02cb78ab152f75ea00cb29f963bc11f0cfe7069675fd5ebe4a2a40b6596b474fc461c7816c834599e3e6d7da99dc07e016d9ec58e91299eac90ecc5d9be62f

  • SSDEEP

    1536:giLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:giyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      04d5643bf6ce4e67e4f8d24e58b0423ff585daf0034bfda0ca762834c3ffeb8e.exe

    • Size

      110KB

    • MD5

      0bf1b2c6baa946230d5ed08fe773c265

    • SHA1

      de1e27cbc5f513699e3fa75eadd222cc79137938

    • SHA256

      04d5643bf6ce4e67e4f8d24e58b0423ff585daf0034bfda0ca762834c3ffeb8e

    • SHA512

      9f02cb78ab152f75ea00cb29f963bc11f0cfe7069675fd5ebe4a2a40b6596b474fc461c7816c834599e3e6d7da99dc07e016d9ec58e91299eac90ecc5d9be62f

    • SSDEEP

      1536:giLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:giyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks