General

  • Target

    8619da3287cc6cf55ed9f21b82ff0c726652bca6ee8452a434c9835afa053976.exe

  • Size

    110KB

  • Sample

    250113-fb9pesyphn

  • MD5

    0fc36a86e1ab729d697a2b3858bf9730

  • SHA1

    12e7c48fdf2095c4be57491f67e0eb4f502f58af

  • SHA256

    8619da3287cc6cf55ed9f21b82ff0c726652bca6ee8452a434c9835afa053976

  • SHA512

    ff630411705ad82e768fde6b0ea466792903b2dfeccf1177294988fdac5af887de4489f81f406a00dc87ea7ee1d2a0629ad53f72ce9d401b238e0c5b8624961f

  • SSDEEP

    1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:oiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      8619da3287cc6cf55ed9f21b82ff0c726652bca6ee8452a434c9835afa053976.exe

    • Size

      110KB

    • MD5

      0fc36a86e1ab729d697a2b3858bf9730

    • SHA1

      12e7c48fdf2095c4be57491f67e0eb4f502f58af

    • SHA256

      8619da3287cc6cf55ed9f21b82ff0c726652bca6ee8452a434c9835afa053976

    • SHA512

      ff630411705ad82e768fde6b0ea466792903b2dfeccf1177294988fdac5af887de4489f81f406a00dc87ea7ee1d2a0629ad53f72ce9d401b238e0c5b8624961f

    • SSDEEP

      1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:oiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks