General

  • Target

    cd151540e35267d06d5f0013e41305cd4cb95a2dbbc8d5960a51930e90d63da4.exe

  • Size

    45KB

  • Sample

    250119-tecqravqcl

  • MD5

    e9bdcfb2a5f68cc6d3efaa5f2b5b754c

  • SHA1

    0ef6969026ed01754d2f9b7a7904176871c94d98

  • SHA256

    cd151540e35267d06d5f0013e41305cd4cb95a2dbbc8d5960a51930e90d63da4

  • SHA512

    2e8d55a897862e335a083588f938779b4b6ed1ba5e822717d4f677c539c37e163a85583532904b29a3d6cd846424f00064802744863daff53cb7b83c27d074fc

  • SSDEEP

    768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:BsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

Malware Config

Targets

    • Target

      cd151540e35267d06d5f0013e41305cd4cb95a2dbbc8d5960a51930e90d63da4.exe

    • Size

      45KB

    • MD5

      e9bdcfb2a5f68cc6d3efaa5f2b5b754c

    • SHA1

      0ef6969026ed01754d2f9b7a7904176871c94d98

    • SHA256

      cd151540e35267d06d5f0013e41305cd4cb95a2dbbc8d5960a51930e90d63da4

    • SHA512

      2e8d55a897862e335a083588f938779b4b6ed1ba5e822717d4f677c539c37e163a85583532904b29a3d6cd846424f00064802744863daff53cb7b83c27d074fc

    • SSDEEP

      768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ23:BsWE9N5dFu53dsniQaB/xZ14n7zIF+qj

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks