General

  • Target

    85995f0d26301c927f5f4762731f9a71901d8d49d74595b968da6fb9cc38704b.exe

  • Size

    110KB

  • Sample

    250116-e7ba3aska1

  • MD5

    a9b5d824c222e12008cc5e15501ca14c

  • SHA1

    f12bf2de58e14bcc395fd6b6561603389faef33c

  • SHA256

    85995f0d26301c927f5f4762731f9a71901d8d49d74595b968da6fb9cc38704b

  • SHA512

    37068f81980b3a5b752d33536c46af03e141f995104ba499b8aa5b01b0dc1076bb711a1da0b49adcb51be7d6041cf386b088cc69c7406c2fb6fcd70d05534703

  • SSDEEP

    1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:xiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      85995f0d26301c927f5f4762731f9a71901d8d49d74595b968da6fb9cc38704b.exe

    • Size

      110KB

    • MD5

      a9b5d824c222e12008cc5e15501ca14c

    • SHA1

      f12bf2de58e14bcc395fd6b6561603389faef33c

    • SHA256

      85995f0d26301c927f5f4762731f9a71901d8d49d74595b968da6fb9cc38704b

    • SHA512

      37068f81980b3a5b752d33536c46af03e141f995104ba499b8aa5b01b0dc1076bb711a1da0b49adcb51be7d6041cf386b088cc69c7406c2fb6fcd70d05534703

    • SSDEEP

      1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:xiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks