General

  • Target

    08332b3cafad601b4b9f4e090ce10416178782bb4b047e7350f6cd0171e2cb5d.exe

  • Size

    89KB

  • Sample

    250121-edfnpavmfr

  • MD5

    75c38c66d6bea32bfa332f1c442ec219

  • SHA1

    838e2d439889577bc98f27f310f7f0874c72cc84

  • SHA256

    08332b3cafad601b4b9f4e090ce10416178782bb4b047e7350f6cd0171e2cb5d

  • SHA512

    8091ffefd00433becc6aa041cf0818687fbcd20dd8d5d4da98a39e370ba114b32b314e1306e678db642e966198d0f58855d4d218b6390889fca4a94395c71dea

  • SSDEEP

    1536:W1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:m+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      08332b3cafad601b4b9f4e090ce10416178782bb4b047e7350f6cd0171e2cb5d.exe

    • Size

      89KB

    • MD5

      75c38c66d6bea32bfa332f1c442ec219

    • SHA1

      838e2d439889577bc98f27f310f7f0874c72cc84

    • SHA256

      08332b3cafad601b4b9f4e090ce10416178782bb4b047e7350f6cd0171e2cb5d

    • SHA512

      8091ffefd00433becc6aa041cf0818687fbcd20dd8d5d4da98a39e370ba114b32b314e1306e678db642e966198d0f58855d4d218b6390889fca4a94395c71dea

    • SSDEEP

      1536:W1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:m+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks