General

  • Target

    25ed4ad3786d62d66acdb4619e14d01c9b0d4ea6320a235f5c956ff08ae82c14N.exe

  • Size

    45KB

  • Sample

    250112-jzwdgstndz

  • MD5

    01042828e00a5f7ff46fcd7ef6441bd0

  • SHA1

    5d8b75a587ab58e6333bc66f1e83ef5d9c2688a1

  • SHA256

    25ed4ad3786d62d66acdb4619e14d01c9b0d4ea6320a235f5c956ff08ae82c14

  • SHA512

    913c9dbe4e16bc2adda6c3965d605b2ffce7eab2683c9557dc2d56e52591e86c6e6bdaf88cf706f74cf3da29d32da6e6166ca2065f473a6764379464407c07c7

  • SSDEEP

    768:yhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:+sWE9N5dFu53dsniQaB/xZ14n7zIF+qL

Malware Config

Targets

    • Target

      25ed4ad3786d62d66acdb4619e14d01c9b0d4ea6320a235f5c956ff08ae82c14N.exe

    • Size

      45KB

    • MD5

      01042828e00a5f7ff46fcd7ef6441bd0

    • SHA1

      5d8b75a587ab58e6333bc66f1e83ef5d9c2688a1

    • SHA256

      25ed4ad3786d62d66acdb4619e14d01c9b0d4ea6320a235f5c956ff08ae82c14

    • SHA512

      913c9dbe4e16bc2adda6c3965d605b2ffce7eab2683c9557dc2d56e52591e86c6e6bdaf88cf706f74cf3da29d32da6e6166ca2065f473a6764379464407c07c7

    • SSDEEP

      768:yhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2/:+sWE9N5dFu53dsniQaB/xZ14n7zIF+qL

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks