General

  • Target

    c8d6e6cf49d864e490e723349500402cfbd10936b283647098cb7011c62e2603N.exe

  • Size

    110KB

  • Sample

    250104-vmg6wazrgl

  • MD5

    684e6513e426a7d665d22139723738d0

  • SHA1

    43d4e7ee2ea2bf25ff10528e5f10df659147e4e0

  • SHA256

    c8d6e6cf49d864e490e723349500402cfbd10936b283647098cb7011c62e2603

  • SHA512

    86801d4f4447bd47c885fb3440af3bec4538c459b4c1c254c73d781a12382e80a53b9244d602e242cf058e9478f76e81162df74af89072aaefbee15bd39e8eff

  • SSDEEP

    1536:riLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:riyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      c8d6e6cf49d864e490e723349500402cfbd10936b283647098cb7011c62e2603N.exe

    • Size

      110KB

    • MD5

      684e6513e426a7d665d22139723738d0

    • SHA1

      43d4e7ee2ea2bf25ff10528e5f10df659147e4e0

    • SHA256

      c8d6e6cf49d864e490e723349500402cfbd10936b283647098cb7011c62e2603

    • SHA512

      86801d4f4447bd47c885fb3440af3bec4538c459b4c1c254c73d781a12382e80a53b9244d602e242cf058e9478f76e81162df74af89072aaefbee15bd39e8eff

    • SSDEEP

      1536:riLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:riyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks