General

  • Target

    61544b0a0e198513bdd41e823100c3925adf028b2b549ccfb9054f9893ca2f64.exe

  • Size

    45KB

  • Sample

    250112-nlwvbazqgs

  • MD5

    b2289f14970544b87384971dc23aa849

  • SHA1

    ff550b78841fec02c6c4b576938abeac0a50e683

  • SHA256

    61544b0a0e198513bdd41e823100c3925adf028b2b549ccfb9054f9893ca2f64

  • SHA512

    9515195e41a11763fef575b1c2d440708d703354ba98bc24f66b51bd7a633b20dded74d4ae585950792ed5310f5c4bfa2e81e7126ba2517de352dcda64f3dc65

  • SSDEEP

    768:yhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:+sWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      61544b0a0e198513bdd41e823100c3925adf028b2b549ccfb9054f9893ca2f64.exe

    • Size

      45KB

    • MD5

      b2289f14970544b87384971dc23aa849

    • SHA1

      ff550b78841fec02c6c4b576938abeac0a50e683

    • SHA256

      61544b0a0e198513bdd41e823100c3925adf028b2b549ccfb9054f9893ca2f64

    • SHA512

      9515195e41a11763fef575b1c2d440708d703354ba98bc24f66b51bd7a633b20dded74d4ae585950792ed5310f5c4bfa2e81e7126ba2517de352dcda64f3dc65

    • SSDEEP

      768:yhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:+sWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks