General

  • Target

    88f6b972ce2f258db112cbb8b32a8d5705467b214dd4b2cded4c82ce734d1879.exe

  • Size

    110KB

  • Sample

    250107-x4eheswrep

  • MD5

    6838b76ebbe2f27fee2adcab41a5ca01

  • SHA1

    d1bcfcbb6ad04d138edc07941adcb3e12d41a29a

  • SHA256

    88f6b972ce2f258db112cbb8b32a8d5705467b214dd4b2cded4c82ce734d1879

  • SHA512

    ccf2e42ae82e3bd1f12165c1dcffc6469b24285c341d7c2d1bd1cb1bf3d531b41901e7a6b2b31be21a9fdb66ed12317971c84afda9b82e6a6486f4d94007fbe1

  • SSDEEP

    1536:QiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:QiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      88f6b972ce2f258db112cbb8b32a8d5705467b214dd4b2cded4c82ce734d1879.exe

    • Size

      110KB

    • MD5

      6838b76ebbe2f27fee2adcab41a5ca01

    • SHA1

      d1bcfcbb6ad04d138edc07941adcb3e12d41a29a

    • SHA256

      88f6b972ce2f258db112cbb8b32a8d5705467b214dd4b2cded4c82ce734d1879

    • SHA512

      ccf2e42ae82e3bd1f12165c1dcffc6469b24285c341d7c2d1bd1cb1bf3d531b41901e7a6b2b31be21a9fdb66ed12317971c84afda9b82e6a6486f4d94007fbe1

    • SSDEEP

      1536:QiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:QiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks