General

  • Target

    3837f7a016f9beba641df930d12bba6a97e151d2f37c7eee7c82588a82990aa8.exe

  • Size

    110KB

  • Sample

    250116-zv2byaypaz

  • MD5

    72168fb4e9f81c17b89a207181e19aaa

  • SHA1

    848e8f5daa50cc1cd460d73f3bf1f956e574a7c4

  • SHA256

    3837f7a016f9beba641df930d12bba6a97e151d2f37c7eee7c82588a82990aa8

  • SHA512

    58a8e302faa178d21fe1df02091885a4e56a40dd3d355a2d48ba59183a8fe7e34965b3ad4ebd5d846b75456aeff7eaca8e27f51865aac588b0056921397a5d16

  • SSDEEP

    1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:HiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      3837f7a016f9beba641df930d12bba6a97e151d2f37c7eee7c82588a82990aa8.exe

    • Size

      110KB

    • MD5

      72168fb4e9f81c17b89a207181e19aaa

    • SHA1

      848e8f5daa50cc1cd460d73f3bf1f956e574a7c4

    • SHA256

      3837f7a016f9beba641df930d12bba6a97e151d2f37c7eee7c82588a82990aa8

    • SHA512

      58a8e302faa178d21fe1df02091885a4e56a40dd3d355a2d48ba59183a8fe7e34965b3ad4ebd5d846b75456aeff7eaca8e27f51865aac588b0056921397a5d16

    • SSDEEP

      1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:HiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks