General

  • Target

    0492f64b23530c4b0ac6d0410f004d525be08ff967422a31224c666107e36c83N.exe

  • Size

    45KB

  • Sample

    250104-j65kqs1lhz

  • MD5

    0326e86c9fbe687454ef5cef6768e830

  • SHA1

    70fc8a5ae662b8338426c1ee4433e597e9a7abbb

  • SHA256

    0492f64b23530c4b0ac6d0410f004d525be08ff967422a31224c666107e36c83

  • SHA512

    53f24ef3a0f8ec0fee909821635c5ae8ae97b3b80b0bf5ecc73046bdcf10c240337739c6eb3921f6d708405b43b748a1cab444d9c1cc7caaefa0ce30cb37dcb2

  • SSDEEP

    768:zhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ21:lsWE9N5dFu53dsniQaB/xZ14n7zIF+qZ

Malware Config

Targets

    • Target

      0492f64b23530c4b0ac6d0410f004d525be08ff967422a31224c666107e36c83N.exe

    • Size

      45KB

    • MD5

      0326e86c9fbe687454ef5cef6768e830

    • SHA1

      70fc8a5ae662b8338426c1ee4433e597e9a7abbb

    • SHA256

      0492f64b23530c4b0ac6d0410f004d525be08ff967422a31224c666107e36c83

    • SHA512

      53f24ef3a0f8ec0fee909821635c5ae8ae97b3b80b0bf5ecc73046bdcf10c240337739c6eb3921f6d708405b43b748a1cab444d9c1cc7caaefa0ce30cb37dcb2

    • SSDEEP

      768:zhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ21:lsWE9N5dFu53dsniQaB/xZ14n7zIF+qZ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks