General

  • Target

    1bb23cd2874c1c67da060b9643b00a6ae3de752aeb95a1fc85370d599da9660bN.exe

  • Size

    110KB

  • Sample

    250108-stwxhaxkaj

  • MD5

    a7e6cca44746f6c48ffc7d108a7e9310

  • SHA1

    20e1881e5b900918eb758dc834a29aef71999a26

  • SHA256

    1bb23cd2874c1c67da060b9643b00a6ae3de752aeb95a1fc85370d599da9660b

  • SHA512

    d6c24ce029c504f44bfe0178ad085693ae90dc231cc9eee397160d84942e761913507c90a440d76bc1189797b25e124edb1e2470b5a3ee86db310595b0a40e4d

  • SSDEEP

    1536:QiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:QiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      1bb23cd2874c1c67da060b9643b00a6ae3de752aeb95a1fc85370d599da9660bN.exe

    • Size

      110KB

    • MD5

      a7e6cca44746f6c48ffc7d108a7e9310

    • SHA1

      20e1881e5b900918eb758dc834a29aef71999a26

    • SHA256

      1bb23cd2874c1c67da060b9643b00a6ae3de752aeb95a1fc85370d599da9660b

    • SHA512

      d6c24ce029c504f44bfe0178ad085693ae90dc231cc9eee397160d84942e761913507c90a440d76bc1189797b25e124edb1e2470b5a3ee86db310595b0a40e4d

    • SSDEEP

      1536:QiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:QiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks