General

  • Target

    07bb713b061e0b7d16c86ffe73e43cdee8be5d56ffe66c318a1d93616c544e09N.exe

  • Size

    110KB

  • Sample

    250103-rp3c2syldz

  • MD5

    b4756d2b77a221d4a8eb20143aeff100

  • SHA1

    284dc6727cd9fedbaf5dfa55bf3b27bb17247d91

  • SHA256

    07bb713b061e0b7d16c86ffe73e43cdee8be5d56ffe66c318a1d93616c544e09

  • SHA512

    097ce1be1dad0d926c82eb6b3b284118315849517667f6a0564251848be83bcf1853cfd2e1448ca0f87e93bde46e4154bbd98bee06de4fb9de10dae93a16e8ea

  • SSDEEP

    1536:jiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:jiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      07bb713b061e0b7d16c86ffe73e43cdee8be5d56ffe66c318a1d93616c544e09N.exe

    • Size

      110KB

    • MD5

      b4756d2b77a221d4a8eb20143aeff100

    • SHA1

      284dc6727cd9fedbaf5dfa55bf3b27bb17247d91

    • SHA256

      07bb713b061e0b7d16c86ffe73e43cdee8be5d56ffe66c318a1d93616c544e09

    • SHA512

      097ce1be1dad0d926c82eb6b3b284118315849517667f6a0564251848be83bcf1853cfd2e1448ca0f87e93bde46e4154bbd98bee06de4fb9de10dae93a16e8ea

    • SSDEEP

      1536:jiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:jiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks