General

  • Target

    bbea89b3d29df2651ae932453ff56683b861d90931e5057340956ec405084306N.exe

  • Size

    110KB

  • Sample

    250110-2w14ns1rbt

  • MD5

    7ce34738ffa331d847fc8cd18d720bc0

  • SHA1

    4a885fc04848e8694757140b27120320f4bc66cc

  • SHA256

    bbea89b3d29df2651ae932453ff56683b861d90931e5057340956ec405084306

  • SHA512

    214b8c5b638657153375dd16870332449b24afa4b487b2bc31571577702e3e387aa2b69ab665f80e620bdc6c59f62d7f2672c77339c18fb16b69240ebb383808

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:liyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      bbea89b3d29df2651ae932453ff56683b861d90931e5057340956ec405084306N.exe

    • Size

      110KB

    • MD5

      7ce34738ffa331d847fc8cd18d720bc0

    • SHA1

      4a885fc04848e8694757140b27120320f4bc66cc

    • SHA256

      bbea89b3d29df2651ae932453ff56683b861d90931e5057340956ec405084306

    • SHA512

      214b8c5b638657153375dd16870332449b24afa4b487b2bc31571577702e3e387aa2b69ab665f80e620bdc6c59f62d7f2672c77339c18fb16b69240ebb383808

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:liyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks