General

  • Target

    97851ea7371010bd67c8bbae1d23629507667dfcf02004c97e2beedc86a6a0e9N.exe

  • Size

    110KB

  • Sample

    250103-pkxwnawpdr

  • MD5

    d714b0bd56f3462805bf17d97ab165a0

  • SHA1

    fe8c79f628e74ee88d4380a4d477002c8f657a78

  • SHA256

    97851ea7371010bd67c8bbae1d23629507667dfcf02004c97e2beedc86a6a0e9

  • SHA512

    dc82107893b3b6333142badf3fecc1c882d565f0dd3801f26b15dd79cf807790921892fba61b6955736af86c35d41e1b7b329adad0a18b5fff3b1f7906b6d989

  • SSDEEP

    1536:aiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:aiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      97851ea7371010bd67c8bbae1d23629507667dfcf02004c97e2beedc86a6a0e9N.exe

    • Size

      110KB

    • MD5

      d714b0bd56f3462805bf17d97ab165a0

    • SHA1

      fe8c79f628e74ee88d4380a4d477002c8f657a78

    • SHA256

      97851ea7371010bd67c8bbae1d23629507667dfcf02004c97e2beedc86a6a0e9

    • SHA512

      dc82107893b3b6333142badf3fecc1c882d565f0dd3801f26b15dd79cf807790921892fba61b6955736af86c35d41e1b7b329adad0a18b5fff3b1f7906b6d989

    • SSDEEP

      1536:aiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:aiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks