General

  • Target

    c9c3eb88a5927e2e2dd069fdb5559bfc44cdb6c7c9a54ae7ef2fdec4e633b224N.exe

  • Size

    110KB

  • Sample

    250111-1sp2katmgn

  • MD5

    94e780073519e16246175067bdac33c0

  • SHA1

    a22a5528a08204870a5020c8efac6f139b9525b2

  • SHA256

    c9c3eb88a5927e2e2dd069fdb5559bfc44cdb6c7c9a54ae7ef2fdec4e633b224

  • SHA512

    b3fee489a168f0b0b874431d4ab3592a212d5e44e9d7c3f11443614556a6374eb3ccba09deeb837830c1e049d8705a5a74c896c5473d1df7657a7cf60f811db8

  • SSDEEP

    1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:GiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      c9c3eb88a5927e2e2dd069fdb5559bfc44cdb6c7c9a54ae7ef2fdec4e633b224N.exe

    • Size

      110KB

    • MD5

      94e780073519e16246175067bdac33c0

    • SHA1

      a22a5528a08204870a5020c8efac6f139b9525b2

    • SHA256

      c9c3eb88a5927e2e2dd069fdb5559bfc44cdb6c7c9a54ae7ef2fdec4e633b224

    • SHA512

      b3fee489a168f0b0b874431d4ab3592a212d5e44e9d7c3f11443614556a6374eb3ccba09deeb837830c1e049d8705a5a74c896c5473d1df7657a7cf60f811db8

    • SSDEEP

      1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:GiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks