General

  • Target

    2bf898ce7abe16882eac3555e76cdedca62bbfbd3d9870010eaf6258621200b7N.exe

  • Size

    45KB

  • Sample

    250103-t5zyzasrht

  • MD5

    b7502ae1bf742ff6356e6ff4fcced270

  • SHA1

    6e07cfbd80f6055172caf1527bddf14d6cd482fe

  • SHA256

    2bf898ce7abe16882eac3555e76cdedca62bbfbd3d9870010eaf6258621200b7

  • SHA512

    f0b5a79063c1d0df7f23548fc8e6a94320f1a8fd21a7d15e15eba2850c04eb15b4d8acd5df03d52ce97a7afcc09c4ba6eaeed6aec49e422b21b837711cfdc279

  • SSDEEP

    768:fhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:JsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      2bf898ce7abe16882eac3555e76cdedca62bbfbd3d9870010eaf6258621200b7N.exe

    • Size

      45KB

    • MD5

      b7502ae1bf742ff6356e6ff4fcced270

    • SHA1

      6e07cfbd80f6055172caf1527bddf14d6cd482fe

    • SHA256

      2bf898ce7abe16882eac3555e76cdedca62bbfbd3d9870010eaf6258621200b7

    • SHA512

      f0b5a79063c1d0df7f23548fc8e6a94320f1a8fd21a7d15e15eba2850c04eb15b4d8acd5df03d52ce97a7afcc09c4ba6eaeed6aec49e422b21b837711cfdc279

    • SSDEEP

      768:fhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:JsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks