General

  • Target

    1fb60d9b6409f8b7472781cd5cc3d4de396b43e92968b2d67728024cadbfac9a.exe

  • Size

    110KB

  • Sample

    250111-nnheps1khm

  • MD5

    1b6d543c3a5a683dc3380685f12c44fa

  • SHA1

    bbb70b12fcb9b487fdde69f0fcd958c73bc84475

  • SHA256

    1fb60d9b6409f8b7472781cd5cc3d4de396b43e92968b2d67728024cadbfac9a

  • SHA512

    95b5e280d207e6cf6fa6371d496750a9219d7a79fb862c7f29c89e2e2cf4d36cad42d8294d03ce04d70fd4446977c36ac2957a23d57e477e407097427615f35b

  • SSDEEP

    1536:3iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:3iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      1fb60d9b6409f8b7472781cd5cc3d4de396b43e92968b2d67728024cadbfac9a.exe

    • Size

      110KB

    • MD5

      1b6d543c3a5a683dc3380685f12c44fa

    • SHA1

      bbb70b12fcb9b487fdde69f0fcd958c73bc84475

    • SHA256

      1fb60d9b6409f8b7472781cd5cc3d4de396b43e92968b2d67728024cadbfac9a

    • SHA512

      95b5e280d207e6cf6fa6371d496750a9219d7a79fb862c7f29c89e2e2cf4d36cad42d8294d03ce04d70fd4446977c36ac2957a23d57e477e407097427615f35b

    • SSDEEP

      1536:3iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:3iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks