General

  • Target

    62b41d2118404ed2968bd220f21608d76f3941f06fa2e90dc0ac3b145d23865d.exe

  • Size

    110KB

  • Sample

    250111-g3rhla1lbp

  • MD5

    cc493f541cf09c4b9c5cf192dbaf5e95

  • SHA1

    4d9dff13a71a8d065dbb8c9959f8cbae58dfb26f

  • SHA256

    62b41d2118404ed2968bd220f21608d76f3941f06fa2e90dc0ac3b145d23865d

  • SHA512

    56e874dc79ba3b752711ab52a5c005b1f6d855ea60d6fe3b7a78367c3e71596a29951055fe855ab2444d26e0151792d67093935f50c5422d30127cadc142f94c

  • SSDEEP

    1536:OiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:OiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      62b41d2118404ed2968bd220f21608d76f3941f06fa2e90dc0ac3b145d23865d.exe

    • Size

      110KB

    • MD5

      cc493f541cf09c4b9c5cf192dbaf5e95

    • SHA1

      4d9dff13a71a8d065dbb8c9959f8cbae58dfb26f

    • SHA256

      62b41d2118404ed2968bd220f21608d76f3941f06fa2e90dc0ac3b145d23865d

    • SHA512

      56e874dc79ba3b752711ab52a5c005b1f6d855ea60d6fe3b7a78367c3e71596a29951055fe855ab2444d26e0151792d67093935f50c5422d30127cadc142f94c

    • SSDEEP

      1536:OiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:OiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks