General

  • Target

    332cc13c98972094ee367e44a6b6bd50ec937215fb479cc8f8a6a2746a3ec194N.exe

  • Size

    110KB

  • Sample

    250111-z4s2xszmbs

  • MD5

    6409e1ae8b59235fb5d99c509b717bf0

  • SHA1

    690d61d86c825d3d4c816037f4f5b2a555c1195d

  • SHA256

    332cc13c98972094ee367e44a6b6bd50ec937215fb479cc8f8a6a2746a3ec194

  • SHA512

    21303838a66eed333bcccabadf24a0236bd6747e94bb1def50fdba01e8e236a52272bfbf84c03e777bf69da6d04ad797cba382dbf928246790818d23e201536e

  • SSDEEP

    1536:FiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:FiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      332cc13c98972094ee367e44a6b6bd50ec937215fb479cc8f8a6a2746a3ec194N.exe

    • Size

      110KB

    • MD5

      6409e1ae8b59235fb5d99c509b717bf0

    • SHA1

      690d61d86c825d3d4c816037f4f5b2a555c1195d

    • SHA256

      332cc13c98972094ee367e44a6b6bd50ec937215fb479cc8f8a6a2746a3ec194

    • SHA512

      21303838a66eed333bcccabadf24a0236bd6747e94bb1def50fdba01e8e236a52272bfbf84c03e777bf69da6d04ad797cba382dbf928246790818d23e201536e

    • SSDEEP

      1536:FiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:FiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks