General

  • Target

    3d31b34ad1ae466cb169d16c8fe3d4a0f3291aa58222adc35cd74460cb99630a.exe

  • Size

    110KB

  • Sample

    250111-d8av9asjcz

  • MD5

    76ea40782d074c30ca43771555de24dc

  • SHA1

    d7d6c3cf2871bba30ec5d5b0ac90c9791cea4db2

  • SHA256

    3d31b34ad1ae466cb169d16c8fe3d4a0f3291aa58222adc35cd74460cb99630a

  • SHA512

    cb23614372ae0d6bf80ef3da519ae3919f0c6176ba8805b462bab2e30ce42632a4c09ad6a77421dac099d50f2689d3b34ba9e89f858038e0c0416851b59972f3

  • SSDEEP

    1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:HiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      3d31b34ad1ae466cb169d16c8fe3d4a0f3291aa58222adc35cd74460cb99630a.exe

    • Size

      110KB

    • MD5

      76ea40782d074c30ca43771555de24dc

    • SHA1

      d7d6c3cf2871bba30ec5d5b0ac90c9791cea4db2

    • SHA256

      3d31b34ad1ae466cb169d16c8fe3d4a0f3291aa58222adc35cd74460cb99630a

    • SHA512

      cb23614372ae0d6bf80ef3da519ae3919f0c6176ba8805b462bab2e30ce42632a4c09ad6a77421dac099d50f2689d3b34ba9e89f858038e0c0416851b59972f3

    • SSDEEP

      1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:HiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks