General

  • Target

    1d5781875e5f4285bd809a228ff281513f2965396aaa45c99d5e8bd588537ba2N.exe

  • Size

    110KB

  • Sample

    250104-hvvqqazqdp

  • MD5

    2d6f90fbbace86d2b053bc8297d240e0

  • SHA1

    90e096f0b6d8b10d9317a8444a4e72306df85385

  • SHA256

    1d5781875e5f4285bd809a228ff281513f2965396aaa45c99d5e8bd588537ba2

  • SHA512

    91e24d4cc38ff1843c61abe234776d9a754dfda307d5c38852a2a5d7595d219fbc195aa5d0ebb8b0e48a9f73d76d04d26a1d0c283a55999de707bed152df3de7

  • SSDEEP

    1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:HiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      1d5781875e5f4285bd809a228ff281513f2965396aaa45c99d5e8bd588537ba2N.exe

    • Size

      110KB

    • MD5

      2d6f90fbbace86d2b053bc8297d240e0

    • SHA1

      90e096f0b6d8b10d9317a8444a4e72306df85385

    • SHA256

      1d5781875e5f4285bd809a228ff281513f2965396aaa45c99d5e8bd588537ba2

    • SHA512

      91e24d4cc38ff1843c61abe234776d9a754dfda307d5c38852a2a5d7595d219fbc195aa5d0ebb8b0e48a9f73d76d04d26a1d0c283a55999de707bed152df3de7

    • SSDEEP

      1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:HiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks