General

  • Target

    9a22ec51e7d078c51176dc4e7e35dd0760c77020f14b7edeaaa93e27ceaecea0N

  • Size

    110KB

  • Sample

    250113-fve9xsxlf1

  • MD5

    7b969e14e18e9540111e64535818e210

  • SHA1

    19bbaacdb500b55c30470e13965be1d047225ca6

  • SHA256

    9a22ec51e7d078c51176dc4e7e35dd0760c77020f14b7edeaaa93e27ceaecea0

  • SHA512

    028da10e8068091a7d21256df0eaef015e56113a2c3d0b983613f4a05d3b40623df0821902855404a062a7011454f52e20c4d2bd9811101af0650e5bd898b7b4

  • SSDEEP

    1536:MiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:MiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      9a22ec51e7d078c51176dc4e7e35dd0760c77020f14b7edeaaa93e27ceaecea0N

    • Size

      110KB

    • MD5

      7b969e14e18e9540111e64535818e210

    • SHA1

      19bbaacdb500b55c30470e13965be1d047225ca6

    • SHA256

      9a22ec51e7d078c51176dc4e7e35dd0760c77020f14b7edeaaa93e27ceaecea0

    • SHA512

      028da10e8068091a7d21256df0eaef015e56113a2c3d0b983613f4a05d3b40623df0821902855404a062a7011454f52e20c4d2bd9811101af0650e5bd898b7b4

    • SSDEEP

      1536:MiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:MiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks