General

  • Target

    b1e41fb0df49c7fe07c85c5bd1faffa620f55bb36d064674b9887c2f91d4422eN.exe

  • Size

    45KB

  • Sample

    250107-vsrmhazras

  • MD5

    8b74361e481e39c472cc77417e31ed40

  • SHA1

    975bf3dcf52a389f968032aa668580f8dcfd193c

  • SHA256

    b1e41fb0df49c7fe07c85c5bd1faffa620f55bb36d064674b9887c2f91d4422e

  • SHA512

    17cc05a23455d32886a410803abfc91af968ab5a40062a6a303685d1920666320958a76c200fb70b89ddc82e8b09063b7ed5065b3bf6a6ad7011922f638c94ca

  • SSDEEP

    768:zhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:lsWE9N5dFu53dsniQaB/xZ14n7zIF+qh

Malware Config

Targets

    • Target

      b1e41fb0df49c7fe07c85c5bd1faffa620f55bb36d064674b9887c2f91d4422eN.exe

    • Size

      45KB

    • MD5

      8b74361e481e39c472cc77417e31ed40

    • SHA1

      975bf3dcf52a389f968032aa668580f8dcfd193c

    • SHA256

      b1e41fb0df49c7fe07c85c5bd1faffa620f55bb36d064674b9887c2f91d4422e

    • SHA512

      17cc05a23455d32886a410803abfc91af968ab5a40062a6a303685d1920666320958a76c200fb70b89ddc82e8b09063b7ed5065b3bf6a6ad7011922f638c94ca

    • SSDEEP

      768:zhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:lsWE9N5dFu53dsniQaB/xZ14n7zIF+qh

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks