General

  • Target

    2a5c94d88118b96264d617fc1df765e2e26d542e38e37442ea7a5e54d0762068N.exe

  • Size

    45KB

  • Sample

    250120-ph47ysyngj

  • MD5

    988ad29616ea5fdb2b86335030b1b480

  • SHA1

    4f7950418c2c6bf0230065497e5b156a75f4f7e9

  • SHA256

    2a5c94d88118b96264d617fc1df765e2e26d542e38e37442ea7a5e54d0762068

  • SHA512

    129347a180470148495e908bbc6adb13d0aabe21d5395197ad095c0647fac324ab5c84bb460985bd6c968a963db8eb0710f780d5bd7d4884d02ead677ae46617

  • SSDEEP

    768:hhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:bsWE9N5dFu53dsniQaB/xZ14n7zIF+qh

Malware Config

Targets

    • Target

      2a5c94d88118b96264d617fc1df765e2e26d542e38e37442ea7a5e54d0762068N.exe

    • Size

      45KB

    • MD5

      988ad29616ea5fdb2b86335030b1b480

    • SHA1

      4f7950418c2c6bf0230065497e5b156a75f4f7e9

    • SHA256

      2a5c94d88118b96264d617fc1df765e2e26d542e38e37442ea7a5e54d0762068

    • SHA512

      129347a180470148495e908bbc6adb13d0aabe21d5395197ad095c0647fac324ab5c84bb460985bd6c968a963db8eb0710f780d5bd7d4884d02ead677ae46617

    • SSDEEP

      768:hhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2d:bsWE9N5dFu53dsniQaB/xZ14n7zIF+qh

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks