General

  • Target

    5dbac8087e1a9a993293737054220a4df7936cf96b171bb23e90a223a33ccc00.exe

  • Size

    110KB

  • Sample

    250119-ttseravrd1

  • MD5

    018d064cd8e33d00ae107d077a380667

  • SHA1

    163c995f97f7c4a70500b0e5a9e792df0991d469

  • SHA256

    5dbac8087e1a9a993293737054220a4df7936cf96b171bb23e90a223a33ccc00

  • SHA512

    d3a7f4fc95a313cc83ee6c1450aba9d3797c6ccae4e039f6a88ff538fcd220ed2abca98a1ff94f54623b0ec3c683ee95396baa551cd4d7ea95692ba04132a1d8

  • SSDEEP

    1536:5iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:5iyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      5dbac8087e1a9a993293737054220a4df7936cf96b171bb23e90a223a33ccc00.exe

    • Size

      110KB

    • MD5

      018d064cd8e33d00ae107d077a380667

    • SHA1

      163c995f97f7c4a70500b0e5a9e792df0991d469

    • SHA256

      5dbac8087e1a9a993293737054220a4df7936cf96b171bb23e90a223a33ccc00

    • SHA512

      d3a7f4fc95a313cc83ee6c1450aba9d3797c6ccae4e039f6a88ff538fcd220ed2abca98a1ff94f54623b0ec3c683ee95396baa551cd4d7ea95692ba04132a1d8

    • SSDEEP

      1536:5iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:5iyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks