General

  • Target

    211ce473553eaee40ad16bb29a8fe25f54fa6782ac27281f3b71d2a6375ee194.exe

  • Size

    110KB

  • Sample

    250111-24f4gatnf1

  • MD5

    404ae68f4f89e996a46a3e88583d733b

  • SHA1

    b399ef240e6fdd7ecfd94097c07cde184558b72d

  • SHA256

    211ce473553eaee40ad16bb29a8fe25f54fa6782ac27281f3b71d2a6375ee194

  • SHA512

    2cbeca064a1c3cc91b0ec5facc1f64e148d71d038c5dc47619a7b7660075b7bfb1153c198afd0d404722defcd7d9492413a7a5c73e4c0ca8c5e955b0835c002d

  • SSDEEP

    1536:BiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:BiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      211ce473553eaee40ad16bb29a8fe25f54fa6782ac27281f3b71d2a6375ee194.exe

    • Size

      110KB

    • MD5

      404ae68f4f89e996a46a3e88583d733b

    • SHA1

      b399ef240e6fdd7ecfd94097c07cde184558b72d

    • SHA256

      211ce473553eaee40ad16bb29a8fe25f54fa6782ac27281f3b71d2a6375ee194

    • SHA512

      2cbeca064a1c3cc91b0ec5facc1f64e148d71d038c5dc47619a7b7660075b7bfb1153c198afd0d404722defcd7d9492413a7a5c73e4c0ca8c5e955b0835c002d

    • SSDEEP

      1536:BiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:BiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks