General

  • Target

    ce3f35a303e5227e10aca06821b272d4d57292ab7b87859d1fab27a68b0aefa6N.exe

  • Size

    110KB

  • Sample

    250112-vvg6vatnhl

  • MD5

    7f8cacf813ba40c2d9619f28f5c18660

  • SHA1

    bafb3e1fb30e0446e5614f15b191cd4ef6007349

  • SHA256

    ce3f35a303e5227e10aca06821b272d4d57292ab7b87859d1fab27a68b0aefa6

  • SHA512

    0ac26d5c447186f9b807607a637fd6964422c06dfe7621626b2d588aca14edb096047c1947e9b591486ba7bbd1e654d6ba9e11272631edd06eac58056c062050

  • SSDEEP

    1536:ziLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:ziyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      ce3f35a303e5227e10aca06821b272d4d57292ab7b87859d1fab27a68b0aefa6N.exe

    • Size

      110KB

    • MD5

      7f8cacf813ba40c2d9619f28f5c18660

    • SHA1

      bafb3e1fb30e0446e5614f15b191cd4ef6007349

    • SHA256

      ce3f35a303e5227e10aca06821b272d4d57292ab7b87859d1fab27a68b0aefa6

    • SHA512

      0ac26d5c447186f9b807607a637fd6964422c06dfe7621626b2d588aca14edb096047c1947e9b591486ba7bbd1e654d6ba9e11272631edd06eac58056c062050

    • SSDEEP

      1536:ziLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:ziyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks