General

  • Target

    0c9210db3b7902003c54a5196f175a417faf24b997dd57c88567501c2d9302f4N.exe

  • Size

    110KB

  • Sample

    250116-pggehazmbt

  • MD5

    3ff71cb65d05c9320c6b3d2ed37d4bb0

  • SHA1

    1b3b1a520565b6e82a8e6c19081981b28b8bfcdb

  • SHA256

    0c9210db3b7902003c54a5196f175a417faf24b997dd57c88567501c2d9302f4

  • SHA512

    08329d1d9990773ff22cb9820bd27b35517325657e74fb1054e4d2255ab6ee3c89ddd7b60f12639524c3be3e4cb418b0e4081947094b22770de2d3ef46983517

  • SSDEEP

    1536:7iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:7iyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      0c9210db3b7902003c54a5196f175a417faf24b997dd57c88567501c2d9302f4N.exe

    • Size

      110KB

    • MD5

      3ff71cb65d05c9320c6b3d2ed37d4bb0

    • SHA1

      1b3b1a520565b6e82a8e6c19081981b28b8bfcdb

    • SHA256

      0c9210db3b7902003c54a5196f175a417faf24b997dd57c88567501c2d9302f4

    • SHA512

      08329d1d9990773ff22cb9820bd27b35517325657e74fb1054e4d2255ab6ee3c89ddd7b60f12639524c3be3e4cb418b0e4081947094b22770de2d3ef46983517

    • SSDEEP

      1536:7iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:7iyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks