General

  • Target

    a50dd600214a9b6d210a4422fd53129a8d68ddd5b840313d834bd4faf88d13e2N.exe

  • Size

    110KB

  • Sample

    250116-dftsnazkfr

  • MD5

    017e9c01492ad088a25596ffe674bae0

  • SHA1

    028855964d0298621cb29ddba32e356df16ed927

  • SHA256

    a50dd600214a9b6d210a4422fd53129a8d68ddd5b840313d834bd4faf88d13e2

  • SHA512

    352d8dfed7c9a250c3320801fc697ea93be0f890b8dbfb30caa7070454905701b5ddbc96f862571c623e791f3c79a1f375f95044f250aa333b37aa479cd26ee6

  • SSDEEP

    1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:GiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      a50dd600214a9b6d210a4422fd53129a8d68ddd5b840313d834bd4faf88d13e2N.exe

    • Size

      110KB

    • MD5

      017e9c01492ad088a25596ffe674bae0

    • SHA1

      028855964d0298621cb29ddba32e356df16ed927

    • SHA256

      a50dd600214a9b6d210a4422fd53129a8d68ddd5b840313d834bd4faf88d13e2

    • SHA512

      352d8dfed7c9a250c3320801fc697ea93be0f890b8dbfb30caa7070454905701b5ddbc96f862571c623e791f3c79a1f375f95044f250aa333b37aa479cd26ee6

    • SSDEEP

      1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:GiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks