General

  • Target

    38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355N.exe

  • Size

    110KB

  • Sample

    250120-y4w8xaxmcx

  • MD5

    fe52f2d0bde65b46f3690d58dbf708c0

  • SHA1

    f613b369fdd56bf29908f6a9f854a201adf9309a

  • SHA256

    38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355

  • SHA512

    02545224f492bd2169dd91dd0d79a6460d5d62279f0b839fc85eb283df1e286d8284ea522ac604280d3eb7499390c6cd5a4418ef0f6ec6017e4b71c9ac149ed6

  • SSDEEP

    1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:2iyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355N.exe

    • Size

      110KB

    • MD5

      fe52f2d0bde65b46f3690d58dbf708c0

    • SHA1

      f613b369fdd56bf29908f6a9f854a201adf9309a

    • SHA256

      38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355

    • SHA512

      02545224f492bd2169dd91dd0d79a6460d5d62279f0b839fc85eb283df1e286d8284ea522ac604280d3eb7499390c6cd5a4418ef0f6ec6017e4b71c9ac149ed6

    • SSDEEP

      1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:2iyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks