General

  • Target

    77c6672f9b2a69524c38d803e105a90dad9807479dde6bb6bd478d8cfe0f190eN.exe

  • Size

    110KB

  • Sample

    250104-mwm5gswlew

  • MD5

    1a5c7bb9310c8390be2d3f63fa4b3a00

  • SHA1

    8db94f8aab9246c01a793a51013d937f92fceaeb

  • SHA256

    77c6672f9b2a69524c38d803e105a90dad9807479dde6bb6bd478d8cfe0f190e

  • SHA512

    9f7046b49f07170567afbba7c72e7a85fe6c2c5784ce2a3039bed6cbacbca3826d2e6dec079dda4805605e3252b5cbb8a883f1db7658e760ccdc5c429f9dba9d

  • SSDEEP

    1536:/iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:/iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      77c6672f9b2a69524c38d803e105a90dad9807479dde6bb6bd478d8cfe0f190eN.exe

    • Size

      110KB

    • MD5

      1a5c7bb9310c8390be2d3f63fa4b3a00

    • SHA1

      8db94f8aab9246c01a793a51013d937f92fceaeb

    • SHA256

      77c6672f9b2a69524c38d803e105a90dad9807479dde6bb6bd478d8cfe0f190e

    • SHA512

      9f7046b49f07170567afbba7c72e7a85fe6c2c5784ce2a3039bed6cbacbca3826d2e6dec079dda4805605e3252b5cbb8a883f1db7658e760ccdc5c429f9dba9d

    • SSDEEP

      1536:/iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:/iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks