General

  • Target

    f4d13f11b78e0c1c3674a7d7e184fbea30387f393bc0e40b11ea794bfcfa0066N.exe

  • Size

    110KB

  • Sample

    250121-l55v8aynbm

  • MD5

    66e1b73df40c3843a115d13946569330

  • SHA1

    c0cc79b64121c5b84b493d7d4754be313441686f

  • SHA256

    f4d13f11b78e0c1c3674a7d7e184fbea30387f393bc0e40b11ea794bfcfa0066

  • SHA512

    e4f8c38f713c37d52b7f7eb841c4f1b5f4fdbcf2f4ad8409f1cc84bfc0e4c0d095d63352b005865635e1e5f13f41c10b4dfd7aa5e57d88121e5895bc6a3d3d7b

  • SSDEEP

    1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:xiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      f4d13f11b78e0c1c3674a7d7e184fbea30387f393bc0e40b11ea794bfcfa0066N.exe

    • Size

      110KB

    • MD5

      66e1b73df40c3843a115d13946569330

    • SHA1

      c0cc79b64121c5b84b493d7d4754be313441686f

    • SHA256

      f4d13f11b78e0c1c3674a7d7e184fbea30387f393bc0e40b11ea794bfcfa0066

    • SHA512

      e4f8c38f713c37d52b7f7eb841c4f1b5f4fdbcf2f4ad8409f1cc84bfc0e4c0d095d63352b005865635e1e5f13f41c10b4dfd7aa5e57d88121e5895bc6a3d3d7b

    • SSDEEP

      1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:xiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks