General

  • Target

    01363c8c9bc2f07ace0d5316424721e6d1410c5841e8cf70ad5f0f2dcf00aae1.exe

  • Size

    110KB

  • Sample

    250121-gvpc9szmdk

  • MD5

    db18023f5273f96617fc36a740b7acd3

  • SHA1

    8aee5a796bed450b91a57baa9c78aec317821a4d

  • SHA256

    01363c8c9bc2f07ace0d5316424721e6d1410c5841e8cf70ad5f0f2dcf00aae1

  • SHA512

    345df442e240fa7ac42cba0ee92f22206cc2a41f6c87d9d2336bf6de911c7eb99fc655ac6407a302d42982df489f1ddadb14aab846007c30c49553622cf80a7d

  • SSDEEP

    1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:HiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      01363c8c9bc2f07ace0d5316424721e6d1410c5841e8cf70ad5f0f2dcf00aae1.exe

    • Size

      110KB

    • MD5

      db18023f5273f96617fc36a740b7acd3

    • SHA1

      8aee5a796bed450b91a57baa9c78aec317821a4d

    • SHA256

      01363c8c9bc2f07ace0d5316424721e6d1410c5841e8cf70ad5f0f2dcf00aae1

    • SHA512

      345df442e240fa7ac42cba0ee92f22206cc2a41f6c87d9d2336bf6de911c7eb99fc655ac6407a302d42982df489f1ddadb14aab846007c30c49553622cf80a7d

    • SSDEEP

      1536:HiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:HiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks