General

  • Target

    67a6bf06e0da2f690aad227edee0cb03d4011ee41f181ec1047dfe724054b4d5N.exe

  • Size

    110KB

  • Sample

    250120-ebg4qszmhp

  • MD5

    14706fb3fed857d23e52c399214b7850

  • SHA1

    d2688373b5c00cb1950486e41d53b0f9489b8328

  • SHA256

    67a6bf06e0da2f690aad227edee0cb03d4011ee41f181ec1047dfe724054b4d5

  • SHA512

    2ba9baefa570128b10ce0129be35ff35b73fe3e3002b2887f075d191c690dab67801c089de704db8814e14c3ce9cd3d1424eb77e80693f72265c54207827746b

  • SSDEEP

    1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:UiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      67a6bf06e0da2f690aad227edee0cb03d4011ee41f181ec1047dfe724054b4d5N.exe

    • Size

      110KB

    • MD5

      14706fb3fed857d23e52c399214b7850

    • SHA1

      d2688373b5c00cb1950486e41d53b0f9489b8328

    • SHA256

      67a6bf06e0da2f690aad227edee0cb03d4011ee41f181ec1047dfe724054b4d5

    • SHA512

      2ba9baefa570128b10ce0129be35ff35b73fe3e3002b2887f075d191c690dab67801c089de704db8814e14c3ce9cd3d1424eb77e80693f72265c54207827746b

    • SSDEEP

      1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:UiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks