General

  • Target

    ba61787864a1b2a489e8f3d9027ad9e50d7462e70c728e4cce20f80561ce2974N.exe

  • Size

    110KB

  • Sample

    250121-1dlets1qe1

  • MD5

    b4c355b867e933b7225c92a177173520

  • SHA1

    b2c5a90cb7e5037cc1d1f7a7785c215bf6d23aa7

  • SHA256

    ba61787864a1b2a489e8f3d9027ad9e50d7462e70c728e4cce20f80561ce2974

  • SHA512

    654212382e544694d696ccf7a9adfbe678a64e1fbb17d7484918342d269e24d099a22f86bdffaa43c9a06b7c34ae8ef9fa0d636a807171a3a9364c0effce1b44

  • SSDEEP

    1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:viyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      ba61787864a1b2a489e8f3d9027ad9e50d7462e70c728e4cce20f80561ce2974N.exe

    • Size

      110KB

    • MD5

      b4c355b867e933b7225c92a177173520

    • SHA1

      b2c5a90cb7e5037cc1d1f7a7785c215bf6d23aa7

    • SHA256

      ba61787864a1b2a489e8f3d9027ad9e50d7462e70c728e4cce20f80561ce2974

    • SHA512

      654212382e544694d696ccf7a9adfbe678a64e1fbb17d7484918342d269e24d099a22f86bdffaa43c9a06b7c34ae8ef9fa0d636a807171a3a9364c0effce1b44

    • SSDEEP

      1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:viyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks