General

  • Target

    bbb81247fa35d011c55be82f82a5d970cebfb05f814d5d73bf0150715bd7f335N.exe

  • Size

    89KB

  • Sample

    250111-ly4dtavrcx

  • MD5

    826cea9a97a07dcb148b97f800cdcf90

  • SHA1

    f8e1f56e5bcc41509829b224f6d22da362ee50fa

  • SHA256

    bbb81247fa35d011c55be82f82a5d970cebfb05f814d5d73bf0150715bd7f335

  • SHA512

    8729baf1bdaaa10544d3f0c1a9fef8a0caecc48b3cae54cb64e0f615ff2e4d7c1acc83c6461daf26950503aab10cce04901188d473ae801eea9c8cd43e287f91

  • SSDEEP

    1536:v1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:N+4MJIkLZJNAQ9Jo9+

Malware Config

Targets

    • Target

      bbb81247fa35d011c55be82f82a5d970cebfb05f814d5d73bf0150715bd7f335N.exe

    • Size

      89KB

    • MD5

      826cea9a97a07dcb148b97f800cdcf90

    • SHA1

      f8e1f56e5bcc41509829b224f6d22da362ee50fa

    • SHA256

      bbb81247fa35d011c55be82f82a5d970cebfb05f814d5d73bf0150715bd7f335

    • SHA512

      8729baf1bdaaa10544d3f0c1a9fef8a0caecc48b3cae54cb64e0f615ff2e4d7c1acc83c6461daf26950503aab10cce04901188d473ae801eea9c8cd43e287f91

    • SSDEEP

      1536:v1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:N+4MJIkLZJNAQ9Jo9+

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks