General

  • Target

    9b28f3231269ace2e16d9b7532eaddc48a5c3dc12013e6f9181363540be57739N.exe

  • Size

    110KB

  • Sample

    250111-d9387avmbr

  • MD5

    9f366052c697dbd8649a21086f9c31c0

  • SHA1

    84e31fbd75c312913ddf6697cc4ab76841107db1

  • SHA256

    9b28f3231269ace2e16d9b7532eaddc48a5c3dc12013e6f9181363540be57739

  • SHA512

    7a6f1bdbf90fca0b330201340ca6f4678ad2e8ece94f5c5680c960c4d112ad7d769b050aea1c56ef8f6dabc0bcad4f784ec0e12a120a99a1e9748011bd68e158

  • SSDEEP

    1536:PiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:PiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      9b28f3231269ace2e16d9b7532eaddc48a5c3dc12013e6f9181363540be57739N.exe

    • Size

      110KB

    • MD5

      9f366052c697dbd8649a21086f9c31c0

    • SHA1

      84e31fbd75c312913ddf6697cc4ab76841107db1

    • SHA256

      9b28f3231269ace2e16d9b7532eaddc48a5c3dc12013e6f9181363540be57739

    • SHA512

      7a6f1bdbf90fca0b330201340ca6f4678ad2e8ece94f5c5680c960c4d112ad7d769b050aea1c56ef8f6dabc0bcad4f784ec0e12a120a99a1e9748011bd68e158

    • SSDEEP

      1536:PiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:PiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks