General

  • Target

    1c72526cee871fd8420e7502b8c70bfca917924342de086c44f876a550d18d64N

  • Size

    45KB

  • Sample

    250113-l9s28a1jer

  • MD5

    377033be6d45b6fc7d52e2f3efb4fd90

  • SHA1

    188a6ed69c250d95dffb602df779540bd0ebab86

  • SHA256

    1c72526cee871fd8420e7502b8c70bfca917924342de086c44f876a550d18d64

  • SHA512

    b79c70f03f9bda4037f250d2038c9407b334eee6e51051e9eaf8930d2d8dcf059824365d164affadce09f47f8b500a15837be6b08efd59ccfc28c3b613ccfd93

  • SSDEEP

    768:2hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:asWE9N5dFu53dsniQaB/xZ14n7zIF+qh

Malware Config

Targets

    • Target

      1c72526cee871fd8420e7502b8c70bfca917924342de086c44f876a550d18d64N

    • Size

      45KB

    • MD5

      377033be6d45b6fc7d52e2f3efb4fd90

    • SHA1

      188a6ed69c250d95dffb602df779540bd0ebab86

    • SHA256

      1c72526cee871fd8420e7502b8c70bfca917924342de086c44f876a550d18d64

    • SHA512

      b79c70f03f9bda4037f250d2038c9407b334eee6e51051e9eaf8930d2d8dcf059824365d164affadce09f47f8b500a15837be6b08efd59ccfc28c3b613ccfd93

    • SSDEEP

      768:2hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:asWE9N5dFu53dsniQaB/xZ14n7zIF+qh

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks