General

  • Target

    5a3e3f8b66b307f9fcc4ef8e6a68d3fd8e416b3716cfd5f6c0893a33b5169765N.exe

  • Size

    110KB

  • Sample

    250120-e7q2hs1rej

  • MD5

    a38edeccb67c1ecfbb848171c7a8ec10

  • SHA1

    af337e6e5f7ec44d85c0cde2326e14780031a490

  • SHA256

    5a3e3f8b66b307f9fcc4ef8e6a68d3fd8e416b3716cfd5f6c0893a33b5169765

  • SHA512

    01461307df5c7970a24f540c95bd3d1696f95b2b01c06d16817ff1a75b339b6d3598477e290b144457e61171716b917807ca45e525dff5cf061ab228505903e1

  • SSDEEP

    1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:JiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      5a3e3f8b66b307f9fcc4ef8e6a68d3fd8e416b3716cfd5f6c0893a33b5169765N.exe

    • Size

      110KB

    • MD5

      a38edeccb67c1ecfbb848171c7a8ec10

    • SHA1

      af337e6e5f7ec44d85c0cde2326e14780031a490

    • SHA256

      5a3e3f8b66b307f9fcc4ef8e6a68d3fd8e416b3716cfd5f6c0893a33b5169765

    • SHA512

      01461307df5c7970a24f540c95bd3d1696f95b2b01c06d16817ff1a75b339b6d3598477e290b144457e61171716b917807ca45e525dff5cf061ab228505903e1

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:JiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks