General

  • Target

    c5473cdd86561ef8661e317f5cd641fcc93f798522dadd6a8439ec9c5fa03050N.exe

  • Size

    89KB

  • Sample

    250119-vysrraykem

  • MD5

    d7be1bd217232d5240dfe40f8b9116d0

  • SHA1

    b1d2674d44215a8369d07c2ce2f710078d9844d2

  • SHA256

    c5473cdd86561ef8661e317f5cd641fcc93f798522dadd6a8439ec9c5fa03050

  • SHA512

    1a04d24f438c5e2e54501e097682723fdeaab175da8315b61f4d1cd37c1697600f313f299c8fd0be9f4be15590820efb610fb7f767dbaec818bfb7de6a5990af

  • SSDEEP

    1536:o1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:8+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      c5473cdd86561ef8661e317f5cd641fcc93f798522dadd6a8439ec9c5fa03050N.exe

    • Size

      89KB

    • MD5

      d7be1bd217232d5240dfe40f8b9116d0

    • SHA1

      b1d2674d44215a8369d07c2ce2f710078d9844d2

    • SHA256

      c5473cdd86561ef8661e317f5cd641fcc93f798522dadd6a8439ec9c5fa03050

    • SHA512

      1a04d24f438c5e2e54501e097682723fdeaab175da8315b61f4d1cd37c1697600f313f299c8fd0be9f4be15590820efb610fb7f767dbaec818bfb7de6a5990af

    • SSDEEP

      1536:o1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:8+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks