General

  • Target

    39d4c50debb7477ee5026d13f99d54ae565f075c242ffe044244c855e6bd6210N.exe

  • Size

    110KB

  • Sample

    250121-gjxkhazjbs

  • MD5

    51604e0745f10875e3660ef3390fb6b0

  • SHA1

    9488614a9a3df9fdcbe891053d67f83851c95186

  • SHA256

    39d4c50debb7477ee5026d13f99d54ae565f075c242ffe044244c855e6bd6210

  • SHA512

    2225b2be1a2ebc536e0f117768f2a436f3826d7968fc01dd346403d0e8a5001152347020fa779155abd8b34623ea2fdbdc67f6b08619abca675ed46c0aec2737

  • SSDEEP

    1536:tiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:tiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      39d4c50debb7477ee5026d13f99d54ae565f075c242ffe044244c855e6bd6210N.exe

    • Size

      110KB

    • MD5

      51604e0745f10875e3660ef3390fb6b0

    • SHA1

      9488614a9a3df9fdcbe891053d67f83851c95186

    • SHA256

      39d4c50debb7477ee5026d13f99d54ae565f075c242ffe044244c855e6bd6210

    • SHA512

      2225b2be1a2ebc536e0f117768f2a436f3826d7968fc01dd346403d0e8a5001152347020fa779155abd8b34623ea2fdbdc67f6b08619abca675ed46c0aec2737

    • SSDEEP

      1536:tiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:tiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks