General

  • Target

    2b6f06f66e8e5b1ddef23e7d959d9f86b333377443103fb58c8e786a48079fbf.exe

  • Size

    110KB

  • Sample

    250113-cdnm7asphk

  • MD5

    e374b6aaac019840e1c696f7c64b3049

  • SHA1

    7f597eb19ca6003632cd4aaafb016ec34554bb72

  • SHA256

    2b6f06f66e8e5b1ddef23e7d959d9f86b333377443103fb58c8e786a48079fbf

  • SHA512

    a475e6f04711c8e919806ad293ec6805c63a5d91c567a80de5bee1a037d531c68a29fa7f38e6913440e49d16f75a79e1e79789be766ea6a7df83816004a34303

  • SSDEEP

    1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:2iyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      2b6f06f66e8e5b1ddef23e7d959d9f86b333377443103fb58c8e786a48079fbf.exe

    • Size

      110KB

    • MD5

      e374b6aaac019840e1c696f7c64b3049

    • SHA1

      7f597eb19ca6003632cd4aaafb016ec34554bb72

    • SHA256

      2b6f06f66e8e5b1ddef23e7d959d9f86b333377443103fb58c8e786a48079fbf

    • SHA512

      a475e6f04711c8e919806ad293ec6805c63a5d91c567a80de5bee1a037d531c68a29fa7f38e6913440e49d16f75a79e1e79789be766ea6a7df83816004a34303

    • SSDEEP

      1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:2iyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks