General

  • Target

    98c895f9acf465a671d1dbaa13318b60060d37ae16481da3a6a9e483cb2b05ad.exe

  • Size

    89KB

  • Sample

    250107-y3p37swrhy

  • MD5

    6732e9562e38f0b0cde25effee0f7375

  • SHA1

    cc46132c6670dd49044c875e8992a1598d968668

  • SHA256

    98c895f9acf465a671d1dbaa13318b60060d37ae16481da3a6a9e483cb2b05ad

  • SHA512

    e6e32ba4363cdc24153cf3c7cd74b76c6bb5897c9557bebffa17a114430e39ad78d5622e18fa42274525ac2d1e28632cabf9901cfb02ca52d5520195ebf5dceb

  • SSDEEP

    1536:r1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:B+4MJIkLZJNAQ9Jo9+

Malware Config

Targets

    • Target

      98c895f9acf465a671d1dbaa13318b60060d37ae16481da3a6a9e483cb2b05ad.exe

    • Size

      89KB

    • MD5

      6732e9562e38f0b0cde25effee0f7375

    • SHA1

      cc46132c6670dd49044c875e8992a1598d968668

    • SHA256

      98c895f9acf465a671d1dbaa13318b60060d37ae16481da3a6a9e483cb2b05ad

    • SHA512

      e6e32ba4363cdc24153cf3c7cd74b76c6bb5897c9557bebffa17a114430e39ad78d5622e18fa42274525ac2d1e28632cabf9901cfb02ca52d5520195ebf5dceb

    • SSDEEP

      1536:r1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:B+4MJIkLZJNAQ9Jo9+

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks