General

  • Target

    5b2930f1c0cc9a040aee1c14eb6fa61072cc45d881994ed2975f6fd2354d8dde.exe

  • Size

    45KB

  • Sample

    250113-k99vasyqcn

  • MD5

    464eb4496887986478c8e366d59be460

  • SHA1

    d1e63bb49b66b5d72b9a6327111f84f21d3b3204

  • SHA256

    5b2930f1c0cc9a040aee1c14eb6fa61072cc45d881994ed2975f6fd2354d8dde

  • SHA512

    6b6e10cd32d717f43bdc8b469dc57e6871a182a6990bac7b01f8792359c51d7d3c6ff11bdb21af0c874a59081568e840952124bd794d87b179e54b249e748556

  • SSDEEP

    768:6hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:2sWE9N5dFu53dsniQaB/xZ14n7zIF+qB

Malware Config

Targets

    • Target

      5b2930f1c0cc9a040aee1c14eb6fa61072cc45d881994ed2975f6fd2354d8dde.exe

    • Size

      45KB

    • MD5

      464eb4496887986478c8e366d59be460

    • SHA1

      d1e63bb49b66b5d72b9a6327111f84f21d3b3204

    • SHA256

      5b2930f1c0cc9a040aee1c14eb6fa61072cc45d881994ed2975f6fd2354d8dde

    • SHA512

      6b6e10cd32d717f43bdc8b469dc57e6871a182a6990bac7b01f8792359c51d7d3c6ff11bdb21af0c874a59081568e840952124bd794d87b179e54b249e748556

    • SSDEEP

      768:6hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ29:2sWE9N5dFu53dsniQaB/xZ14n7zIF+qB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks