General

  • Target

    4a227e191ffc7d89315641a9295c27d6c18508b98b1d7eabcb581d85877ad471.exe

  • Size

    110KB

  • Sample

    250112-jqdgbawjel

  • MD5

    590e945f4cf0d7d70cf0270289bb48a5

  • SHA1

    bd6183b24916e727c89abf3fffaea479117b359b

  • SHA256

    4a227e191ffc7d89315641a9295c27d6c18508b98b1d7eabcb581d85877ad471

  • SHA512

    b4ab7eac4376a7355baac1fbc803ae08a15e3b020a3913462a4f292ad030898fb5e01e8759ea4433b64d819c9bf73257683c903461037f3fafe09304816aa35a

  • SSDEEP

    1536:miLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:miyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      4a227e191ffc7d89315641a9295c27d6c18508b98b1d7eabcb581d85877ad471.exe

    • Size

      110KB

    • MD5

      590e945f4cf0d7d70cf0270289bb48a5

    • SHA1

      bd6183b24916e727c89abf3fffaea479117b359b

    • SHA256

      4a227e191ffc7d89315641a9295c27d6c18508b98b1d7eabcb581d85877ad471

    • SHA512

      b4ab7eac4376a7355baac1fbc803ae08a15e3b020a3913462a4f292ad030898fb5e01e8759ea4433b64d819c9bf73257683c903461037f3fafe09304816aa35a

    • SSDEEP

      1536:miLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:miyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks