General

  • Target

    2f1b368e658519544df48417473cf3d42cd567c3d99b2bfefa93185cbb006e3d.exe

  • Size

    110KB

  • Sample

    250116-p98z8asmcp

  • MD5

    5a5bb698650bc51c3515ca1da21dd49b

  • SHA1

    fee5cf2bd208d904b6c3a100608a84998ce0267e

  • SHA256

    2f1b368e658519544df48417473cf3d42cd567c3d99b2bfefa93185cbb006e3d

  • SHA512

    14649c358e24d18f9b43fd8133aaa23920fb9516ace965bf277b1d13d6289d75dc013df0cdc7d1a8782706753aa158ae767b2f03ab0594ede78c2337320e4e81

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:liyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      2f1b368e658519544df48417473cf3d42cd567c3d99b2bfefa93185cbb006e3d.exe

    • Size

      110KB

    • MD5

      5a5bb698650bc51c3515ca1da21dd49b

    • SHA1

      fee5cf2bd208d904b6c3a100608a84998ce0267e

    • SHA256

      2f1b368e658519544df48417473cf3d42cd567c3d99b2bfefa93185cbb006e3d

    • SHA512

      14649c358e24d18f9b43fd8133aaa23920fb9516ace965bf277b1d13d6289d75dc013df0cdc7d1a8782706753aa158ae767b2f03ab0594ede78c2337320e4e81

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:liyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks