General

  • Target

    1cba2c030dd6f508b29b0c8ae6464c84256c049558f8124f958716733cbf2a89.exe

  • Size

    110KB

  • Sample

    250111-nk5qts1kel

  • MD5

    0666f9fa8cc953d85a7dd0929f1abe53

  • SHA1

    3c603b7af893b2ad1781d7bba65e9e6925ada136

  • SHA256

    1cba2c030dd6f508b29b0c8ae6464c84256c049558f8124f958716733cbf2a89

  • SHA512

    b0362746d10d9e6bb70920a5173519e00a9aea02ea63c24cb618e47b6638563ce3d6abfb9563a093d95073374ee2540597158f11a041a88ce89fe6a90869048e

  • SSDEEP

    1536:PiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:PiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      1cba2c030dd6f508b29b0c8ae6464c84256c049558f8124f958716733cbf2a89.exe

    • Size

      110KB

    • MD5

      0666f9fa8cc953d85a7dd0929f1abe53

    • SHA1

      3c603b7af893b2ad1781d7bba65e9e6925ada136

    • SHA256

      1cba2c030dd6f508b29b0c8ae6464c84256c049558f8124f958716733cbf2a89

    • SHA512

      b0362746d10d9e6bb70920a5173519e00a9aea02ea63c24cb618e47b6638563ce3d6abfb9563a093d95073374ee2540597158f11a041a88ce89fe6a90869048e

    • SSDEEP

      1536:PiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:PiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks