General

  • Target

    4e097654bd9af6569bb7c0e5b0097cb6d58432e1fdd10b32b3b018fc63548d2e.exe

  • Size

    110KB

  • Sample

    250121-e63nxswqhl

  • MD5

    30d629312f26531f92383ea47e55c80d

  • SHA1

    ef789469645cdafe0338ecc83283e6e79d5a204d

  • SHA256

    4e097654bd9af6569bb7c0e5b0097cb6d58432e1fdd10b32b3b018fc63548d2e

  • SHA512

    d6c6db044de2ebd8a5cdd44638c6e622f22aade63932ef83a203e2a5a7f55f87285180a6c62742de11646820d90793c88c33ffd44446e72fe1ac511c7327ab20

  • SSDEEP

    1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      4e097654bd9af6569bb7c0e5b0097cb6d58432e1fdd10b32b3b018fc63548d2e.exe

    • Size

      110KB

    • MD5

      30d629312f26531f92383ea47e55c80d

    • SHA1

      ef789469645cdafe0338ecc83283e6e79d5a204d

    • SHA256

      4e097654bd9af6569bb7c0e5b0097cb6d58432e1fdd10b32b3b018fc63548d2e

    • SHA512

      d6c6db044de2ebd8a5cdd44638c6e622f22aade63932ef83a203e2a5a7f55f87285180a6c62742de11646820d90793c88c33ffd44446e72fe1ac511c7327ab20

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks