General

  • Target

    afa297a303a0b6edf27b374d64df1598cf460006db0e1fd452b5da275debd6a1N.exe

  • Size

    110KB

  • Sample

    250116-qsc2wssnd1

  • MD5

    d5301a495bfe149b5cc5eb814232d6d0

  • SHA1

    434a9af135960ecc9f84b2f72f3b99c1675d0e28

  • SHA256

    afa297a303a0b6edf27b374d64df1598cf460006db0e1fd452b5da275debd6a1

  • SHA512

    f1f24029c8161132487a58b449c42619e4d5498e72501bbfe5c1ea52f31f6ae05327620f08b39d4900d96476b92ab5006d1bf1b219120da32c24ebc2c2f3c214

  • SSDEEP

    1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:oiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      afa297a303a0b6edf27b374d64df1598cf460006db0e1fd452b5da275debd6a1N.exe

    • Size

      110KB

    • MD5

      d5301a495bfe149b5cc5eb814232d6d0

    • SHA1

      434a9af135960ecc9f84b2f72f3b99c1675d0e28

    • SHA256

      afa297a303a0b6edf27b374d64df1598cf460006db0e1fd452b5da275debd6a1

    • SHA512

      f1f24029c8161132487a58b449c42619e4d5498e72501bbfe5c1ea52f31f6ae05327620f08b39d4900d96476b92ab5006d1bf1b219120da32c24ebc2c2f3c214

    • SSDEEP

      1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:oiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks